Analysis
-
max time kernel
62s -
max time network
54s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-01-2025 00:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steam.cmo
Resource
win11-20241007-en
General
-
Target
https://steam.cmo
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\SteamSetup.exe:Zone.Identifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818053253022521" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4249425805-3408538557-1766626484-1000\{BD3CDABC-F0AE-4D9F-B1F0-EC6F031F065D} chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\SteamSetup.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 2984 3368 chrome.exe 78 PID 3368 wrote to memory of 2984 3368 chrome.exe 78 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 3560 3368 chrome.exe 79 PID 3368 wrote to memory of 4812 3368 chrome.exe 80 PID 3368 wrote to memory of 4812 3368 chrome.exe 80 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81 PID 3368 wrote to memory of 784 3368 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://steam.cmo1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb50f8cc40,0x7ffb50f8cc4c,0x7ffb50f8cc582⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1848,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:32⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2124,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:82⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4104,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4336,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4532,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4412,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4460,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3524,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4316,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4860,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4384,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4924,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:82⤵
- Modifies registry class
PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5100,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3344,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5200,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5388,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5644,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5232,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5964 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5052,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5656,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=3724,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=5832,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5880,i,10867300643627799571,938466542882825595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:564
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004C81⤵PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5825a816fe5be96a4ab668d5a11eda12b
SHA17d5a9ed25ba4274365451d1b027e9c72a166cde1
SHA25619f2d98136e25e5c94a5f38bc28071fd63c3e00fda27f8135b4572aaf7bda657
SHA51254a69f74cce3eb608519eb8262eefe6bab864ad9f77348703b9b40d2cb531fbfc8078b3b9f0f56beaf6039541ff5a47d34a8b9a870656a753aa750dafbd299b0
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD594850cfb2a05beb52e69e2a2de379185
SHA11169dfa1e9e62c581018babde8f0ee7e9751135b
SHA2566897ee41d0b4ed12e10ca5306586a006ba3e07861c12f534abc8a00e442c9653
SHA512098652bd57db96783f361c97b04db3cfaa98b305a607e02ebb2d9033727c5a3583061e8bf5d833c61e485c684540c92d15b72f342d415a7bc2c8c4c0d3dba953
-
Filesize
1KB
MD5614cc0c6b93ac2cd152f99e11426f408
SHA1267efee385ef71e1971c7a259b81ae62bd40e283
SHA2569f6fc7cc59e605c4968692e38d135447682be3f16c302b7b35e41020c515ef03
SHA51205528118085359c5ea6b7a33c4f694e26b1276750ef5dfe8a94bb58b3d307d054ceeabd1a85b80f3b1f3c8da5565d9ff02ffb3f135f7c162bfbf5030ab6dcdc4
-
Filesize
1KB
MD5b36e26fa92d81a03e0be206c79337896
SHA18c2b0860303b80a94aa148237093e6674a02de83
SHA256eeb17e4ced31934e350fcc398065f44d85bfa790b2226bf8c0912e33bd352ae0
SHA512207ea7e9537bd03f44acfda227b2995714e78ed9e0fddc048fad901b293ddb32e4ceaf1e08bd855156a393233efa531ae6ec1d4aeed104f144e358d018ea2f05
-
Filesize
9KB
MD575c4cc51c7263e23a6b35947b2036358
SHA16171588258302c1ba69809f3a9b4f8badfb77e08
SHA256625986b4dd4c0ff2f7b1bcdba40eb4bbce016a25ace6a84f9f7d9362ceeb4a7d
SHA51270503a667627601ca4d774b84bce1ac607b6b3bcceaf571338b092c48bd6c02cbe2c588c1ac34632c6b75d378eb1e616be3ee08ab75d617c2ac9fc9235d17f77
-
Filesize
11KB
MD5281eb7489cd404f60e82c14f0b5bb282
SHA12effc1377f2742164ac824711efa6c94ba59e6da
SHA256d51e44f5b8b0d5c09d7460aec6b6c4974c98c32f26868a5ad7c12a0325aad78d
SHA512001a204c08a83057fe1be4790295b92b516620e0783de81106e1d989e9ea47678fdf159bb7f251b2bf098aacbfb7f66c6ddbfd78ce54bc29319737c9db9bafdf
-
Filesize
10KB
MD5d1ba1775fcc54df02d4a275b2924965f
SHA11551173b138030e05b3a712645645863dc4c32c0
SHA256d0ccafed652dbc369ef791e57bbdc7f81f34598ced77db789ccf7869b1ece8a6
SHA5126effb34dee6402214f2a7754ed067644087233c6be5d5bafba02c6b37481c227df71d42a75b92475b50be5c97c0d9260e20e2370e70a4094503fed4ac049a7d8
-
Filesize
11KB
MD57523f773046cf14926fb07f9f68b3454
SHA1447b4474f399bc86ea517c153eee3d254fd3d8f1
SHA25641868d7c5c601067c21961bceba926ee9193211b68edd0585f9525c752176d4a
SHA512ca042ef7aed5373d229b016e04c14724e66e272239ad8827bc7e3a31cd27cf631c131ee289eb284ee7dd4313a21f595628ede25836304e677dd00e9b3edf89e0
-
Filesize
11KB
MD5552da96da12cb9b898cfe0b6e73f2e10
SHA11de1b2e30747bee1453f770628e54146729cd2f2
SHA2569fb59fc48ff3b968b4c6153e7a1248a409015ca6bf5a1dfe3f1967a291256fd7
SHA512ac593693904fff68603bacf382723932beeb4e0ac874f8b208a0ab30c6fec59921d54d363bbd8f5564221870a76317d31b8e20583b91c8e92d8fcb69b44d509e
-
Filesize
228KB
MD59f5cd8d2ad3162d62bdb0f282195bd29
SHA15e7548c2710dc9d25fdc0d9c8b131f79937300e8
SHA256d8afdf4a165f0b70311466a091e326067d5b81ad0a2c6d0ef108ba6237f719f0
SHA5125664a6ddddc2c883d9f7c7577ad99966be1541968147331a547257b3f55b174e7c49e09d52937ecd0a34b06e5016869c5367e74ea378ad9f045b0137e00dfe02
-
Filesize
228KB
MD56e36ca8f9e5ba8deeb6c65f1efd0a815
SHA1707bf780f9beb3ec0fa6bb0cb942d30305c289b3
SHA2567e3c169cc4372d968244cbe013b713bcfcaedc4fb3f5fd8c29f492901ddd1959
SHA5126a3eba08abef174e74ed2d685703a32c138b2c288b82815201c5e7d48fb480f3f90c0a13f3f60abf53dd398289cd3b92e236274d34f32d155e5ae4ef7813b2c8
-
Filesize
228KB
MD5d6fe8efe2e623b02d8de986172e03137
SHA175503adbf60c477b28d20ca861f9c5c567190ed5
SHA25673848e32e0c90cca52a3f69612c42c8647c68ea6608c21438a1cdd1fbaec0c36
SHA51261f808c0f0710539ea083c7cdba6efb4e7dc8596ecf39cb344719edb7dfe1b4321520597ee24732cb822e2c3399c9cf6dc252d60113b27a208f658b3f6d77daa
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb