Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/01/2023, 19:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.utorrent.com/intl/es/web/downloads/complete/track/stable/os/win/
Resource
win7-20220901-en
General
-
Target
https://www.utorrent.com/intl/es/web/downloads/complete/track/stable/os/win/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0BD5591-92AB-11ED-A20B-4279513DF160} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005e3132cc6669a3409d17f8aba32f6449000000000200000000001066000000010000200000006a5166a50bb6ddfae9bb21f5f53726c297f9ae0eaf4c046e1a55b5305cb7ecf0000000000e80000000020000200000003d65f9b7c57f24df160678939c18ce3863d83a9a9ca871fed906bb25907c6449200000004f0c50e66107fcfd3d9eb93a22746ee4fe53841acf11d12c01f71d414f1dc2f340000000d34ac91fe6214c9a43bfc4502b1fbdb7521c87cc3208b00adfd047ac5d233a056f749dbbcb42b1a3cd14bd072b6d25c90a4b6fc8af012d025d5eece948b13f8d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02ea48fb826d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 464 chrome.exe 1576 chrome.exe 1576 chrome.exe 2496 chrome.exe 2324 chrome.exe 2324 chrome.exe 2116 chrome.exe 1640 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2024 iexplore.exe 1016 msdt.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 520 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE 2024 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 520 2024 iexplore.exe 28 PID 2024 wrote to memory of 520 2024 iexplore.exe 28 PID 2024 wrote to memory of 520 2024 iexplore.exe 28 PID 2024 wrote to memory of 520 2024 iexplore.exe 28 PID 520 wrote to memory of 1016 520 IEXPLORE.EXE 30 PID 520 wrote to memory of 1016 520 IEXPLORE.EXE 30 PID 520 wrote to memory of 1016 520 IEXPLORE.EXE 30 PID 520 wrote to memory of 1016 520 IEXPLORE.EXE 30 PID 1576 wrote to memory of 1660 1576 chrome.exe 35 PID 1576 wrote to memory of 1660 1576 chrome.exe 35 PID 1576 wrote to memory of 1660 1576 chrome.exe 35 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 268 1576 chrome.exe 36 PID 1576 wrote to memory of 464 1576 chrome.exe 37 PID 1576 wrote to memory of 464 1576 chrome.exe 37 PID 1576 wrote to memory of 464 1576 chrome.exe 37 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38 PID 1576 wrote to memory of 1920 1576 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.utorrent.com/intl/es/web/downloads/complete/track/stable/os/win/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\msdt.exe-modal 721236 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDF3C85.tmp -ep NetworkDiagnosticsWeb3⤵
- Suspicious use of FindShellTrayWindow
PID:1016
-
-
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵PID:1740
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65c4f50,0x7fef65c4f60,0x7fef65c4f702⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1092,7426695357619451,5407754318546194939,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1124 /prefetch:22⤵PID:268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1092,7426695357619451,5407754318546194939,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1092,7426695357619451,5407754318546194939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1784 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1092,7426695357619451,5407754318546194939,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1092,7426695357619451,5407754318546194939,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1092,7426695357619451,5407754318546194939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65c4f50,0x7fef65c4f60,0x7fef65c4f702⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1104 /prefetch:22⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1800 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3340 /prefetch:22⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3564 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3660 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=768 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3856 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3860 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3760 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1088,14311287463167634415,17426709970908071733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3752 /prefetch:82⤵PID:2792
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5fc80069047253d14d66fd16a255ad052
SHA18d3e6dce271e7ba912de2210f45a660471545c18
SHA25638a76ddc389cf166479defcfd4317d44780584376d13350aaab69a6b5e96c693
SHA5124e64e4d6d9c0a457ea95de1bbb204ec91d35e9bf1f3c027c954c575ed9be2e0cbdeea633f8f3eec8c235c27c9f99ed5aa502058037ce569279fc5de46900f93e
-
Filesize
264KB
MD5ae9aa17f1117042dfcfc2cd536442ab0
SHA18e6722ca5b528a61edeb55fa33d8b9c8926f708a
SHA256759ca9530b6c304826efdfde40f7c6c02eab7d644c54593ba463e40a98943ba7
SHA5125ff64a961e74a114c9ea8f663c7c8479a2b50bc004481899fbd777a978622859739cdab78767cf9469875db8bd33a10eea3969df7f380a6a85e2662d2306ec92
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
329B
MD5ee6ed7db85234e1a45b3b8080b2778a7
SHA157a6fb06bfb9cd24ebcdab624fd2a25e45fbb369
SHA25669377421ee983444bcc8fcb40d81745d2bd1189545fe84ae375d13c0c4fa0586
SHA5122b78a325449ea204c3f2c16afd32fa8ec943d56892f6cbda770e6618fe667d3c7396528dd8a0a6a3f59c95b7daa081b04a91a2c8db19f3fb2ac0e891b9688103
-
Filesize
452B
MD5f1cadc60452d1646baaf6a701ae6fcc1
SHA18f7004a4d17a6b80ae1855d04756aebbbf0d8349
SHA25675808f73d0cdd1e7232dcabb40ecf051c728c573b7df973c526bb7a1f9d5ff40
SHA51237a4f924013f851ea87d14cf8023679bc9ff695943928b48f7bc984dabe629989b4bec3ba1df1d5acefec3745465fc6e06460ee15597d8a3e0ac65d7ec1caefc
-
Filesize
331B
MD5f6ccd333bcbefac5a4ad2e55376e7a8c
SHA1454bb39cb211319bc256ca16c4de9f115b67296e
SHA25620a49120ff22f5e100793137009708f170b93afbbd92a3084a901623e25d7c14
SHA51278b0ca031833150a65ff9f42b9c9629de22879aeeb80da218d9033a8293e7a6eb2b3e4a9b940d2eae7ae10accb05d8cf9b04a31024105852ce5899375da5d5a8
-
Filesize
4KB
MD56a7d8352e0dae778922c6f833fb88cd6
SHA1f4c9397a982b9bb8dc6ff6a7c438ccd505149af0
SHA2569c3f019c1ba2f917bb6a97d9d8827842de47b795a304329220cfd07659d32ece
SHA51278c2494aeeb117eb7f0fcc0b57b3a39363db29d258746e6936b4112fcf72b13d8681450d28708c8dee8aa1d1809a8385b52f3b318d3756ce5cee57ab581495ac
-
Filesize
36KB
MD507d1f9ce06b8fb0815d6e1c1a8e9bb63
SHA1f372c1608482ad424b03cf5754b56964911bb039
SHA256396c5d59749c180fb11c20eb96bfa8d39bff2680b4fad569b3052935b99b0058
SHA5122cad79f4a3c483448278e55db1f7720db766d9b512c04c9caa991196f54ae0e5a8f64b755d4889c52ed5f992791093ea65df49154d0871cfaaf06cccb4039257
-
Filesize
20KB
MD5b6b4342b51ae35d7a2398b6bccbca6e7
SHA1bf7c4cfa8e987700223e82d75203e1bd6249f9ce
SHA256acc308a009a9fa902e33378a1289827d7bf49530d87bdc38efdec148a9039f3e
SHA512fef86e430c92430640d6dfc04fb7188b38018a73d165fa7b246eeafd0d559e6901c4a9535620dfb8f5a102699b58cbd3616dd21dd51c5878e883e732232a4512
-
Filesize
15KB
MD51d4a6da91f3c5fc0a1489f248cdb7f78
SHA1210a15b920175add6afb7310822152b5fa189f0f
SHA2560cbee52709f4eb4a628b277b805576a0ad38de644f0ed2bdbb4b26cb490a2d30
SHA512d2c86f702a8662634e88bea80e26f784bdcfac3d2154ddff19e8da004d86f4e4b07970ea82c5beb1e951df216427844227132761e2655f1ae4257f8b8fa7a656
-
Filesize
137B
MD5a62d3a19ae8455b16223d3ead5300936
SHA1c0c3083c7f5f7a6b41f440244a8226f96b300343
SHA256c72428d5b415719c73b6a102e60aaa6ad94bdc9273ca9950e637a91b3106514e
SHA512f3fc16fc45c8559c34ceba61739edd3facbbf25d114fecc57f61ec31072b233245fabae042cf6276e61c76e938e0826a0a17ae95710cfb21c2da13e18edbf99f
-
Filesize
317B
MD5740dbf8d2d8a5bf3365b7a5c2ea2149f
SHA1cb064919befaade1581b1167c066cb64d3140b27
SHA2560139be6c07165913fe30e72dc9a6b0d409ac6d0db44022918a8288e31012b7e1
SHA5123a22c321375524f44231c6dc37295f5ed4b209ff98434848b5458f13d14fd766b7b6f81d5516710f8a3fd4c78305febc30ed7e10ca520afdd2c64721ca573c5d
-
Filesize
669B
MD5b831197d979542a9fa5d39ca78212da6
SHA1d50ccb06d02f2d64b53fee0060b42945ed540693
SHA256d6e88c2519faac227890bbedf0360e30625ae3f8954cbfe9ad1413c20242030f
SHA51205acd3c4b83631636d1b73dcc4a7264727c27eee2e7d9c5f8264451f178ebd4d2b06bbe8b9b1d34c09e9ddfd3e587b6853dc1c42eaf3c9cd665cef2062c9a46d
-
Filesize
345B
MD5daf2ce2c4215ec9b273b6ba87259068e
SHA106bfffd13956327990ba524d74cd6c7583a99d60
SHA25690cd48860eb2f4c2abc23631712be217af2af9140e19936201c8d900abcb14a0
SHA512c55fd5d89ad882988039eb7c90e5eb0a234202221deab240c7ad0d488d2683a0b23fd9e2bec107f4aa9acee354a32f25d030dd34e0f3323b0e662ad0719dbcfe
-
Filesize
160B
MD5de92ad90be6d3364745b2f73f4c3cf73
SHA19158681463bd30e5af4dda4baac81f93cedbda77
SHA2560025a3e0d3b834401b3b5f820e1991ef7e810d9a4b8b6b579e6301c94e7031a0
SHA5129e81cefc195439439f4b23ee7696309d7bc3c08e5b444d2abde26d2f12b2d3bcfd124fb9a2d40c6389e9f787741676fad366a2e9982674e7b931028c014d8a79
-
Filesize
321B
MD552cfb57b9b4273b8c6cc9852a97ad92a
SHA1683fc126413ae9615e9cd6748e678f17f9261ab4
SHA256b20de4e6edd80068efabf270545e049f2b1183f86adb31ea3fc58db3cbb103b1
SHA512ea7401c6bb6bfac9e9c2b09049af5499a87e5510510e233a0bc6c471b9bd621f9f4873a2c5c0b38f7ab86eb2cacf7371d099d7d5d870314921acd50fc337bc3f
-
Filesize
199B
MD5f11214119b9a000e1fd5f33c2e21f994
SHA1685f402a1e87729650bdf0e926a6ca841ddd53ad
SHA25697fc8a297a5f3b7b07b2465fdc6f640a7e9814ac709ed6a3c519f8583c6baf9c
SHA5121c6c2bc639c52ba51394e5d5a74bc358364324d1beb9e1d901f253a53a3aae8df001aaa6a6b3fd1da905aea6b9ca7e76c61f5da534d1acf12447eb6afe61123b
-
Filesize
13B
MD5b63048c4e7e52c52053d25da30d9c5ab
SHA1679a44d402f5ec24605719e06459f5a707989187
SHA256389caa40ea458e84bc624a9af1e0dec60fa652b2db2b81c09b1dfe22822cc3d1
SHA512e86c58c5a25e24f21ad79ed526a90c120a09c115f4820663bd2ebbc59e7bb1c4c418267eb77645522aa20b2c1b53fba8e31690db7bae9b21e4eff3db06316359
-
Filesize
105KB
MD5d758d6fd8c3bdc6bbe154c35eb2de2bd
SHA1fb55e33cb4ff73b3a9d8aeb93765ec7d688afcde
SHA2564c8ee29e70f93b03e6c53a6f75c25f28e1e6d7c219ec04f6835c6d54af36f53a
SHA5125b9521e589144c830e27eb35b9915998e359bba36da0ff29b1ce1bcb19aeaebe0a3e5fb588f8876798225485b953ad07a9b5383e36b5317d98271d8413697945
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5B
MD53db4b0630b537258a07579ba8674795e
SHA10f4fa76da461d454c76d53af19b8ef014a95c085
SHA256a077c1b00ed16a29fbd48fc66a35315480eb1f91bc9735f5fe9689fd23962049
SHA512f44b4751712dcbaf9c8c88b8a01873396589dbecc4d49488bbb26d45b339743fef20a56c165ac617820d5c0e38ca1a432a4f4415d3de47b6d83ebb81c46fa2e0
-
Filesize
3KB
MD548b3e8b5519989578bee7f4a1e8d343b
SHA190cc6d589c3380f0893fdaa0118e6251fb509849
SHA25613aaa1043ed02dcdd7edfc4782a9f25cf0806ae8f3d7596b9814dd801b32302b
SHA512258c34be7a34a58f285bcfd51f970b0e067991091452a934773491cba498d912f07a2677e3995ef21476c0dda2704a54e40fa45bac46858c19cae252a1747ea1
-
Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66