Resubmissions
18-04-2024 14:48
240418-r6rb4sgb22 1011-02-2024 09:54
240211-lxlsdagh99 1002-02-2024 12:22
240202-pkb9ysdfd5 1014-01-2024 01:01
240114-bc9zcsabb4 10Analysis
-
max time kernel
61s -
max time network
68s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-04-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
96362573cc5e47dbbefa8c9a0a775055b19bbc3c67b9a328a632d2da19bf4c29.js
Resource
win11-20240412-en
General
-
Target
96362573cc5e47dbbefa8c9a0a775055b19bbc3c67b9a328a632d2da19bf4c29.js
-
Size
366KB
-
MD5
faa5c1602d97a596cbe130aca048bc6a
-
SHA1
5df32e61bc6d49b6b8dbdf637fb7e5f54d1b981f
-
SHA256
96362573cc5e47dbbefa8c9a0a775055b19bbc3c67b9a328a632d2da19bf4c29
-
SHA512
f765277d12e041976d528b4921684ed320c5ed277d7d2036b82b87f2ad35b3c2b0742f4bcb0e13aa5081c72ba8a9aa27ed40be5d63ea5da759f36359d3b70bee
-
SSDEEP
3072:MtJHg/rntoaLx8RvZ1jO7iTqEoDOYW2HfLcGAoaKTkmB5MjA3fV3edY:bTng/aimtKYBT0SRVUY
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579253573963710" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4568 chrome.exe 4568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
chrome.exepid process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4568 wrote to memory of 3220 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 3220 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 1836 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 440 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 440 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe PID 4568 wrote to memory of 2292 4568 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\96362573cc5e47dbbefa8c9a0a775055b19bbc3c67b9a328a632d2da19bf4c29.js1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc95a4ab58,0x7ffc95a4ab68,0x7ffc95a4ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4260 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4444 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4420 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4740 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4108 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4820 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4852 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5004 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4624 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5172 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5328 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5416 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3296 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3444 --field-trial-handle=1808,i,3409229751854288287,10439217835785093715,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1d479728-a47d-4825-bdd3-1a0b194d0c0c.tmpFilesize
16KB
MD5215ef6f0e4c11ed90e50075e1dcc9231
SHA1785d4d5273496f581771a2faa69422aa25e1eb04
SHA256047b3523a068f7bcb9cb5689126802a4a22c9515abd5e27c2318437d2fe58198
SHA512d34cc0878049ef5353dce58b1270b390ea7cd5ccfdeaa976fb285785bc347b58f345711d396fdc4af0843a96ad26718dfe4c659153de091930b6ad6cdabd7894
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5ae5b1abcb3f1bc731f556ae27e3373e7
SHA19a30327ad81f3c200e65516c40497b825a2c4f04
SHA256eb695ff409a98da9ae978e50ba73f0d7edfd895c6b928178a7f88d5ea3405d7d
SHA5124d291d851ba3ec1e4f962754e80777cec38f4910860846bf99b50f76e9a639b5be8bbf54b4d2d43eb7fdf7a8175c669465349bc3247954b3f11f6d295cdd7637
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5d4f19aa661782d228722b9741520d48a
SHA11eb3832dd473f54e9e157d8aa3180419d909b986
SHA256ad43a452c83202913a9141b9843e5be2302ef6ce5848d5279b8d684303e3407d
SHA5128a62fe4875d71999e0fc482d6251152065652f377599b24a5d77258c654ef72ff59bb6e747b280a5a4d40c3e5fac4724a57aa98f0e0ec3fab4b269fb0330a12b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5fcc12b50273c2789658f0af0007a3fa3
SHA179579e24be0cab33f5e5e6e0c74e339666e09edd
SHA256f9f5634fb6d4d7115ef9dec9ec53f498859339823697206847067e6256387110
SHA5128bb527b528ceda01cdaf3f346e534b8a3b436b9fea2db519f1f10accf52339aab7ad39705a161d38e492c535a082823836ce32fa28fdf0a846cd0a2cb07479b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5c3c5b1d378a0004b0e13606a42e21849
SHA1b1b0283712d5f56a0a0aceeb06222319e36d7e1d
SHA256e845853b1c952eb7c6bd79b0ca5ba475d737796befc3b7a248f0f94fa017e170
SHA512621784a8cfcb69820813e40f95ec0d2afe9006600808fb68576141f45c6d078ca1ed8465a14546e644249adda9ce2daa0ced7140ed8d2471b62336fc40b665ed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD554ff5c83a9b1f726d9673ec4ff1430d6
SHA1e16de2f4b66c77d1c8794ed40a90fb7c0bf9e791
SHA2564f78d3cc8acde8b95e5fbdddcd024e711405869c78c08e8f0372f36e17076bdc
SHA512fa03f07f6ee351a49031752759985fa5af6a7bf015aedcbcf5c3e9812616fa0b15ec5b54dce8af6e07c59e60715a1ad194c0237b02b61b271c2a9e57b6c2f0b9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD54038ab7b9f4bf7b07f7a9a5a90cf8d82
SHA179346aa42a49ebb16a1aa5bd4ba6f767ddd97633
SHA256e4b4baf67f1a328702b74a341b665df0df539abc41896b3079cc056c799b5e0b
SHA512a0488110388d68021eb993cbd13c26d3bb3c48c170237b571c8d200f9ae054573823305c8f7cac904cd65280a95a810dbcaf2e5d698936ef1de8725bc4260852
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD50b830c7bf16951706ab90eed23a46ec5
SHA1ddb49f52a122dd086426d227d1d2372d604dfa84
SHA256910f0d904292b913acacc0b6bf3072301ba5ac3ffd3f45acae2043f64e5afb39
SHA51295ea476312a6c4dfe76423b2bef1584ee70068ca3286643d188911e7ff87e21e805689c6800c1f9968283f1a29a8e79b36bc90964166f5d0aea2cfc13c5eb1d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD538875669b2a18ee29f5b6ef50b1a3cf7
SHA1b339c1f0d33bd0bdfe9cc7537e1d32e67c79b5b7
SHA2560f02678d4e173e666c6d77d45faada5764e527fabdc30eefc8854ad2f7c836fc
SHA5127bc99f70481bc084aa48f59fe936826f89f18365bd2f540525c5fa1601298f7dc03ceca8072b4e495f9a372c89bebfb397be9d58a0ac5df1722c6d45b004a186
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5c55b6e05250a47cb6211e15515939eab
SHA17ac97aeee8a94b88ebcd1dd8b84d3ca3adbb8412
SHA256f5af891f4d7070b5cb618d821dbc6939ffcabb78b8d01150c4a61655023d810c
SHA5125951d383bb62be3dda30a5c49cb558659c511b9c1843f9f8e9da3ed39265d4f242271e1a550056175c788de7acaa81e38eb9803f0e809292255a47279d5ef9dd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5b9dc0ec005010309470676e701359c69
SHA1420f572c1e0631a733be6b1c8c27433de7cd7ca4
SHA25602bb3118001c3a7178c9a980e1d172b668752425fbf393c1287c71839a4cb22c
SHA5126bdfb450f4558057f244e9466c33eb8732d8a5c91a078b072d398d3b91897aa9e85b9b0bf8c6fb26619ccdf8cc2ef9df2bea2f413a7a8dfe6775531ea478977c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD54db96c128b4ebf43b752b95aa4d50622
SHA199c799932c444077c9a0b7a65dc54dcf902f186f
SHA25649b684e678560d596b6474e8f8ba4f64728ed0819880a8a64c84095c6bd72779
SHA512463deaebde8f1865485a8f14d2ffa7e8fd81008e75e656818c0879b84ee331e11461de9ed7942032a1052eaaa846f2fd6ab306497242cf2927ea23b81d9b2711
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
128KB
MD5016f916ee9ac801b45ad07753d8d0d0a
SHA153f0b445887ed7f55b3033dedbefaae2699cb91f
SHA2561032d119660b0caa9e03056ba0d1bc81f65b47f6540876d343eab1e099e87b59
SHA512533810537eeafb716986d36f1487b8aec2d09f5534253f3187888ab0a4a1d7ae040b63ec6e7b985d121c7504c789227e5560162148bab2321bdb9d049807f4bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD54536e342e5b1c5d056eb5f2ff1d9946a
SHA1422c89a300ad95c0d1c91ec9bd64f36384a5b73f
SHA256d3e5c2a782583fdd203408de7aab867758296942ff48fcce8eb01340671f3feb
SHA512c2bca54e2799cd48b3eab4e9e96d5fe57c114429a96c6affa5a7a17026e6abc51fb89676a05394cdc9a2735607595728cbd064ccb8495f12b7b4aa09db10c710
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD5769ea4c8714268c248c610d8c3bc0082
SHA101c79db863d564ff49a025c65d0438276125ab1c
SHA2562bd3648aa935dcd1b98ff825738715adb0696f1717b2ff65443f633ff4dc9f9c
SHA512c425d64772db61ebe36c2308e84fcaafdd9e52b2443a753c9adcf76eba5a0ba7dbe3d16e23aaa4dd960e1cf92bcc21cc99e963278fd464ff5181cc17e699db2c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD5723cc5b903282cbed0dc418567508d4e
SHA1f70677c28f23d42c9389531d73bf1e1277c8db30
SHA256cf32d0511b282ef7b8dba8e5cccf736bc593a9a2632b730e024d2d7032a2be81
SHA512663a0bd1d00ac63121491975dd82c24e084e17e1bb4527d02642c85e4759969176c93b11f18f8eab2917347cf338f0757f54acd8ab1ba70d335980864c5a8dd9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
86KB
MD5f55a14fde6c6f82c2557a80ff7030acf
SHA151ffe32459c1d11352e9686994ab63b66bb49a6a
SHA2560de70a17e93ccea7b9eff7d2d2627b067be92ef688ec29489ec0126d5817335a
SHA51266fb6e1f28de9af478719b586f886ade78512f03414d086c585cc806dcdda42e0144877346efd4874106c21cf44cee181725066df9d38e4d415f6428b2ff568c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe587172.TMPFilesize
83KB
MD523ad37b45170d8817c05fbcd61b931c6
SHA158bc60446db8fc2ec5deb36e6af72bfca996af16
SHA2563ba5a760bc5a317a8e6b6e47f3a12c482499bd82aa5a00a4b86a86a4228386d2
SHA5126d4cd1d80ca8bcb9ba679932b94c06b8f6ee8076445efbbee2a87641f7a06d4228dedf9dd2a879ef2e1dca58c042b9c331eca0a13392dffcfbe87d4fab4211b6
-
\??\pipe\crashpad_4568_UOQLIZWUAIMIKZLLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e