Resubmissions
02/04/2025, 19:27
250402-x56cjavmy3 302/04/2025, 19:14
250402-xxqxwasscz 302/04/2025, 19:09
250402-xt6h6avly3 1002/04/2025, 19:03
250402-xqqnja11g1 1002/04/2025, 19:00
250402-xnnfds11fw 6Analysis
-
max time kernel
181s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 19:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20250314-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 170 raw.githubusercontent.com 171 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880940354782833" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1712 4744 chrome.exe 86 PID 4744 wrote to memory of 1712 4744 chrome.exe 86 PID 4744 wrote to memory of 4452 4744 chrome.exe 87 PID 4744 wrote to memory of 4452 4744 chrome.exe 87 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 3648 4744 chrome.exe 88 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89 PID 4744 wrote to memory of 5204 4744 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff994aedcf8,0x7ff994aedd04,0x7ff994aedd102⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1548,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2044 /prefetch:32⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2016,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2344,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2496 /prefetch:82⤵PID:5204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4280 /prefetch:22⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4728,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5200,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5224,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5588,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3624,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5448,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5220,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5872,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:5424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5912,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5452,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=6024,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3572,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5944,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:5304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3536,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6100,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5776,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=728 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6192,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6232 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6464,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5992,i,17576898668888524024,11973584695723830152,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3772
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Deskbottom (1).zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Deskbottom (1).zip\[email protected]"1⤵
- System Location Discovery: System Language Discovery
PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fe6e36e5c06c967b8370b0f942043ffe
SHA142ca60856deae0417e8e7be50ddd728b4fc6064c
SHA256c3a5bdab350bc7018428f22b1ba407d5ebc1fe8f4a4f728faa7b641a2672c8df
SHA512bda61c8066b15785eb3470bc474e97372f601910e0b65d1d5387b196ad31dd8e2cc7720151acda8f5a6cb39b633121db6570acc27544b4fcbce95fbdd411d237
-
Filesize
63KB
MD500a34503c5efdf7f4815c3bb9cc9cd68
SHA1a85d51a8bfe01bc2c26bf0cbeae56c057788e452
SHA25695ac4bfd07bbab1602f31faf2b3a3ae4064bf191917b229440a6cc722af24764
SHA512c52764de41844701a47d0eec201649f20813a51a7b68feae77b47fe32bc90771c809682de3b12a94f37c2d41c8adca5a3707ad50618b402cc49b2f78d23c4259
-
Filesize
38KB
MD5f53236bc138719b68ccd1c7efb02a276
SHA126b7d3eea5d3b12d0b0e173ebf2af50a7d7e56d6
SHA256787c14f8cc865430c03c96a345044b7c5b8dc8a032511a500d4a42228533acd8
SHA5125485bc7ccce8ec75f60bca3be846086a4bd4466009c8e22da9cdd16bb1154529af2fb2667cd3a97485cc4f6635fb79ac0fdda4f3e1f39f25f6196f708a92d740
-
Filesize
38KB
MD59436affc97843765a966b3568fa7e5ec
SHA17bfda74bb30589c75d718fbc997f18c6d5cc4a0b
SHA2567165713d3e1a610399471a5e93d5677508f62ef072c1151e72273bf4bd54f916
SHA512473ec3a843c33e18d6d194651fe11353fcd03a7959225faeabf8c77484155ea6a7bccb72dbaf2093ed53c408faa3be9f6fc907f7a5ddf8223375f9d09b504456
-
Filesize
72KB
MD5fbb5c013c329001e8eca105dad5453e4
SHA1818796e6ba546861c004cadd32b18dab138fb1e5
SHA256009013573b801be76124cf4bb84e9e86ac57f98d8edb677c1f3b6ba02fc3f283
SHA512097e470ef5791d2ce95c3504eefc57f7d4e41a83443b4232ced084a3d6bd7a67ef60af1a5ee980a1aaf453f92f0344e8477cb96ac72f98a9ff852ee052f7bd29
-
Filesize
413KB
MD54d72633ca29b2fa71d510d8d7795b11c
SHA17b86ad70c6a5138e37760b042eb1511a507a4122
SHA25634ab9c1892204cf28ce3c096cb355139df51f616e1ceabc5311ce6fce74f49ed
SHA5127df2ab536db3efc47cf29049749dc01b41c5fc2cc23ee034f0cd30c2a34bb1d705756a7d51d2ecf42788c71b90617245d7972e5444a76c66c7baf1118f0bf394
-
Filesize
75KB
MD5cd15cfa087b7b71d43b5a2b0baa33097
SHA1fe7cdaecf0520aac9b4086ff8552ac16729d45b2
SHA256806f159945d8a652dbc8c43d18e9cd8caf0a5e0355c86062fb43fb1118401f2f
SHA5126c6e3709b9f75af0993fdcf5ecf8b8a0528eb5a4606222214f9a9f4bd5420db5136980324d4e6969898568d4b7b86bdb9ed39c15af40135a1870b88c6e1ebc52
-
Filesize
3KB
MD5c8e6185395445b2aad586cf8fe409125
SHA1d511b5b98ad5d8a9b47416eb2e6e1e26fcca80b4
SHA256c5b3869719fe1d08fb362fad6d91a5a86b857d29555a77dd6714137bb11778f1
SHA512f5908991c6d174010b33c2574c52bd52ddf08eb1dd05724dd12285fd3123f41afae166d0d3f80d66cc6b22f85299f76df65b3336dc88a2d4c3832c534367cd08
-
Filesize
3KB
MD517bd2047332e4f96ee55c6236e738921
SHA174f7322cbb713ad6a05fccfdd59bd21f2980c4e8
SHA25655699221b2c226f929cbb3f55175a48b2cf2e6f826a01e5967bc45e4caa14689
SHA512e0de4279fa080f0b492a157c3533ae78d44982c005900c3469f11f0d678ce2a2f9a7d416f97cbe13399d454f10b58c5ed6fcb846848d7ff782e1545fa8dfc604
-
Filesize
6KB
MD5799c9f3da421f505da4e1c860b12e0f8
SHA149d6303b47adb5ed219da88be87ae38db9e291c4
SHA256e0a277bc1daafed6e23d94f01c6c9f860cf505319b447a93d51498f8da82b475
SHA51223aa756d7c6aa66166e4630930af73ca88a1e46e09aaea810d39acce775fcb260b8d2fe0c0e7affc70a73ab36a44545bb2c87e96c5eaa8518941cded3953161e
-
Filesize
7KB
MD5c1a2a834e8d9c3f50149a354614c427d
SHA11b5d1b609d24fc7fc8a24f6901916cef77326c12
SHA2568fd76397724c2ad247c1c5a1cef5d1ccb0fa33c8fcc7150c49aa774a97f35225
SHA512caf35bc19c287679ed3bc4a2aa4b0c767e404f74512e666870569396eb6fba6c4d4305aef7e193aa7afde5937357f1452637876dbe188ae90bf066a8da87296f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5e04ec6b7290318577978944dff817970
SHA19bb48f02ce5ef1a850c46af2a32b1bfef330ca22
SHA256c52d1f1c366e70d54606a55b8b8d22efd55cc108bead146b4d0d00db676abb64
SHA51257f026bf1c1ba196ea31074c196a113bbabfd9f7f7ca9efd3744f6e21e6caf6c8076668366ed7935f414ba56b7d93a1c842e5fb1dd3e625a1e1a2b265ee7cdb3
-
Filesize
11KB
MD565f22fac8efe7af0e576304c72dc4e7d
SHA1c715ea29fec61a711d59318f8b69409ad64e9ecc
SHA25649fb26eaa403ff2425cc9c3ee58232a33fd127bcdfd58ad932794d8df57577c9
SHA512cd4cb981c9f7b2ccb293fc7f77aa4986c086a9ca6fe0183e993e6633d506a9b7df77dff41fd8a6468bb764bded24bc493958dcc7ac08fadba00b5a1c211a7efe
-
Filesize
12KB
MD50775c5593199f571ea90382c60f7740b
SHA1f1673e4573d7ec4d609058ba797ce81172ed6711
SHA256b9a9086dfe82c5c07bdc0198fba20809d67750c084c90b1bf7816be6ece4cbaf
SHA5124a9e96609e1727e346dbbf15a9e59c1783467ab1acbb196677bb8b104f81167750c3ffb8e0adafe421d9b1ecdf3c8ec4de2c39759d5f0163a06e08f09fa8b86b
-
Filesize
12KB
MD5ffdbb2cfd70043c08b11a6654a2bd436
SHA1d561c6b903c2927951f87b74120d257ed62f7015
SHA25650ab66debc285d42fa109b3048adcde1ef054cf972fcd056a98f1e1a43d521f2
SHA512b5cf52a2a10f4a9500f0de15bd11229e8ec569a3cc112861e445e79f996b1a486f5f5b579095d18881869253ee135821e7ed4868d0029797f0065d36e753a1ba
-
Filesize
12KB
MD53283509917333722b793b9d75ed90f66
SHA10c109ba9f38b896fff07993a9c5d2442cc9f9b2a
SHA256cb94402de2c616342ccba7c84881e471656548b7e59dc85c2647cfa1fe41728f
SHA5129a90120ff2d702116044ebe0df914fbdf1a97a685aa85572f51bcdb189eca467ba923cf7c01f72ebd7d7ca532d15c475f98b721e43f6f8bd35ff742f3b622c0a
-
Filesize
11KB
MD51eef1e5392286e90a55fa0e91692b30a
SHA15371cb0287c02fe2559ba07a10c86125b6e22f26
SHA256866b43390f7f02da70cf77f42907738dcf794c0fa77beef379850326bbac6e8e
SHA512c10acaab3dd5c7c98972cdfac6fa8f7007a193fe9a989656ccf7253a0a85d29749012a706e76056b791349df2b7035cbf31bf00a7f8fd3b7d56cba4e5303af99
-
Filesize
12KB
MD54913fd63451d918a315bbc71b471ce7a
SHA110c7e3664f1e371c5a6442860507742fb7be23d7
SHA256647180aa94b84c39d2ac7d3bf295fb8cd5c1a3b583e6325872d73723b78cb8fb
SHA51216a91a1b152c2392de04955d96ae3e0602bc613d4030e1f31e9392bf01e2a4d61103068272e9ab2542bc869e2939d2d3c278026c74e1e2f2725835f3169c42fb
-
Filesize
11KB
MD5bea3b75fac378564a42a0b6e4081ea3f
SHA1d703794254de91b3c427089755ba13239bc7d2fa
SHA256f7cc53ac99f3da7902b07ef13dba7667b5f2259cfd05850a0e3d0a7e7c5a9695
SHA51241187147fbfa06dd177980c322705b7cd09fa9d4e68935a288b063298a018e676c14cd7682731f083b8d66350d39947bf54b54ad5dbdc26804e32d0ee389aa93
-
Filesize
12KB
MD584c604ea3e6be61516f905a4f4e2b5fd
SHA1bccd7277006becfe9b1421b1ff7e5642041a9fcf
SHA256868ac0750e305d8de96e3c88d622e273aaea23d00ca90fcf38f2aa6a944822f0
SHA512fe554ca711be8dc56134000ce5cb3389f477b49a8cc53eaebc0594252df7fc0abb46e8bc842ca42ef1a53d04874588082772da0c469edcd96eb2dfeebfab8f97
-
Filesize
15KB
MD54865523dfbe62a2d17bdbcc426d6deba
SHA1c6e849ffef3035d7e069923652f90c68f686206d
SHA2565d511999212f1e6d398dd54480ab00f7ac2b53006d7925d2c515c429f9fc9c6d
SHA5125fbe07cb1566867356fa796987ce8011e9333c7f1647bb61796672da514eb2084db54f07e47ba08fbd39e72eccfde7fbd60991c79733a5a5c7e724ca6e189499
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD51a2da575bb0c4a10037384d164910a3d
SHA10fccbe7ddd47548d3e8a46bf2eb46013f6d50ae3
SHA256e5a64ef3a3ddd9909bf2a6a4515aa9da8ffb9af9721253a2c35a2b3cb542ebbc
SHA5125cb28bfe06c543c1e66119a95ca342d529e3ed852798a5da0d759192648d9cc1ec60132189d0277bdc65bd93603d86a229f2fcc72481ce28611590b47876a148
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b6dc.TMP
Filesize48B
MD5d08b69a9b742ecc97a5ef17a6b0572af
SHA1ce1b4e5039ca1b6d46de66fcfbbf282db03f3002
SHA25631baced1565448e3025f12f3b6dc05b7ee3b3352c24328c1a5723a056d68ed7e
SHA512995feef4bcc3663ecac1eae7d1e38c25675144b6309c4c7ad802cc984f9188782df8d2824247b9061cb735c2364945fe06ca420408056f50524ca10f96a399e8
-
Filesize
80KB
MD571be31c8d0fc84dd63dd06f0b640803f
SHA19d7cedcc3421b7697483bad4f0f9f8ce0a213330
SHA2562b58fbdb2064b34829943afa2b5503e77acdf84834d0f584fd8d4027bec19d73
SHA512734deb7b5ff41e904baef92e819c744a825d2b8b88991a7dbd554fc82d88daaed0bfc79f0e9efd2abc38d4a514623721475905554773b936f9a83f58def304cc
-
Filesize
81KB
MD521230f74e1311d0e97a33ca58b36c0bd
SHA16df8898eaa7e859b1cd6a88ea0b0c36bbe95927f
SHA256341dfbd666b5b02dc9bad42b1b1e1a6c41ce259725c2538a3ecccedcdbe8c38c
SHA5123d4f824f0d5d9e6f55f0d2b44f735b6f9acbca46d88a2d974d06ec5a0b1303ae46322bc8b6685cee5395a48c3b11ce013a73005511089b8c5d5e46ec9a81cac2
-
Filesize
81KB
MD5e2c55404e92751daa3d8e3f4dbf0c6d9
SHA10119ee5983a5cf8df2f50be2344f81525d7b79bd
SHA2564ae62492e09eb84a1225e145e85c9574e5b5fc5e0b6e12cbcfbe0c98b1c2df18
SHA5120389e42496379029ebdccf399543e823f4ee69a6b9ba1cdaf9bf316b3365ff5b7987a8d4cf97801984c67038200bd0230a300478db67655fb42578964ad2f9a6
-
Filesize
81KB
MD5819411b965679fe12a695f582b872f51
SHA19f929d354d3f30f4e1c450ca79c68789aafab1dd
SHA256f2e66f9c656088f2b22b737eb254a16f407a411faed507b49a7690e0b3033a70
SHA512ea8f0eaee472b7bce4bb5c61346271bf05d356c3ad54e9908e2ddfe25fb0406ba807a87aaa7c4f479b2c8bc90dcbb5eae4f395c8ed28f443066090b5abb677b2
-
Filesize
81KB
MD5d237b3668f1de137d19d49b1e613eac5
SHA1a8a785268ccd699d7ce737661bf4749fd44e1819
SHA256cc2e2998be897a4d96ea7ee8eeb92c168bdca53ecbd26f0df8fd44d2d5800405
SHA51235f6ff7fbdcbef534fcbf224e2c1fde7ee49425badba0443c6a531144dd993bd0b3e4fb7b460536db8ddd9ad28ca8cb1834e754a7ac0a72ea22df4447631f7c1
-
Filesize
393KB
MD561da9939db42e2c3007ece3f163e2d06
SHA14bd7e9098de61adecc1bdbd1a01490994d1905fb
SHA256ea8ccb8b5ec36195af831001b3cc46caedfc61a6194e2568901e7685c57ceefa
SHA51214d0bc14a10e5bd8022e7ab4a80f98600f84754c2c80e22a8e3d9f9555dde5bad056d925576b29fc1a37e73c6ebca693687b47317a469a7dfdc4ab0f3d97a63e
-
Filesize
236KB
MD50575625e5ced1be9f4018c5afa456406
SHA170f86daa07564d318c2825e08e2f70e8bcbd7967
SHA25637e612d9c4d2fdc46c132a1ebac107c720e45135f5c79956140f8d38a951332f
SHA512992f17fe1348d9f4d5f3870302a268998194e8d59c1087b3474568434e8dd90aeefe57aff7d0caa91fcfe7239cf9e9f38094b3767ae9d9bb592c41942282088f