Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 04:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clickemailmkt.ahmsolution.com.br/ls/click?upn=FAZ9Oj6UHbo-2FUBIZwgcdILIk-2Bu-2FC3uvNwV3SW4NhYTvQqJ7ilBZvJtA2JVw5J6uZY0sV7-2BDYTYzQwoHtUXSjeE7qzD5hdb69qY-2FEjBMWmQow08FPHm1s9R3Iz-2BpCPuA7yxqomXLeVysRqFvLeJCv-2FDXOX9x5nHufB8DWZnZ9lBKOksUNDK4vzxreagndeRmqJM7sjyeH-2BGty-2FFLJdCEViJABrDfzTYFI93lCiYc8jNSdwWSi4bzk9XZayLQSEb5gt9hyWrTRDCmFZcR7mU6JAqGMj0OvmVSgn-2FbAM06ye-2FWsG-2BLk0rkMQJhssXzv3fNi49XfJIOQ35hSAww6Aefthg-3D-3DIZEN_ArY9ML-2BImYTkED4-2BfXS2Ct3CAhGNXSOYWBLn-2Fkt76qYojxTch0qFTfarqzA4Txyc9zyZaF7QoGkqpwltNtmMLHJCl48xa-2Bu8ztGyY6-2BQkCkgsMcNt-2FpWw2n3tco2P7vlA-2F7U7QyRp68PiLNPNkMEIZUer9tCxxHE-2Fqe6sQXcgDsVQul6ExMHr6dmlOGFf5BbfMct5mH6-2BqimR-2Bp9ujc3yw7EvOrpC-2BjPX4MoTD5rxnctY6KIj3d2jWA8ahf40-2BFXP-2FU0arqNZnPWwxfDr8QPY-2BNg-2FZPzlPwZ7pYnozrgELUEWsqn5KcqCPtWOh8F2THLFAg-2BPturdV2-2FpP36iYhajxVuJFWK5TEecxACoVqnSew96IDcdVV7nsKiduyHL6IB6Yb-2FRpKB-2BDVbFhDoOFpP7tH4KTWTkNp6-2BQt2BFg-2Frd-2BJ-2FvB9jmCMPOmHgY-2FPocVW-2BlSNEzcRPxoT4WwKQgAGfGaeFtzSEpPdBVE-2F0pQtwuM138BH7WQdmRg7zreOZNuoAKrnv-2BWEyrdq3nxAEleTTqFumnehT3kPXTJIktxebC1yCIVtFo5HRtnLfZSxSsPdz-2FL4w-2Feviu-2F4sY06G-2BSVMm-2F7B686lqg3EeiTd-2FY0aILnX60zGwsgx9cp64GLY-2Fl1ROnW0weFwrSAi1JRVrTFovQQDbycNTj30NZMwai5YrKeRaOwbFyqxKfeVup1hldcbYXr9cdXZaH5Db2SoUHZtQ-3D-3D
Resource
win10v2004-20230220-en
General
-
Target
http://clickemailmkt.ahmsolution.com.br/ls/click?upn=FAZ9Oj6UHbo-2FUBIZwgcdILIk-2Bu-2FC3uvNwV3SW4NhYTvQqJ7ilBZvJtA2JVw5J6uZY0sV7-2BDYTYzQwoHtUXSjeE7qzD5hdb69qY-2FEjBMWmQow08FPHm1s9R3Iz-2BpCPuA7yxqomXLeVysRqFvLeJCv-2FDXOX9x5nHufB8DWZnZ9lBKOksUNDK4vzxreagndeRmqJM7sjyeH-2BGty-2FFLJdCEViJABrDfzTYFI93lCiYc8jNSdwWSi4bzk9XZayLQSEb5gt9hyWrTRDCmFZcR7mU6JAqGMj0OvmVSgn-2FbAM06ye-2FWsG-2BLk0rkMQJhssXzv3fNi49XfJIOQ35hSAww6Aefthg-3D-3DIZEN_ArY9ML-2BImYTkED4-2BfXS2Ct3CAhGNXSOYWBLn-2Fkt76qYojxTch0qFTfarqzA4Txyc9zyZaF7QoGkqpwltNtmMLHJCl48xa-2Bu8ztGyY6-2BQkCkgsMcNt-2FpWw2n3tco2P7vlA-2F7U7QyRp68PiLNPNkMEIZUer9tCxxHE-2Fqe6sQXcgDsVQul6ExMHr6dmlOGFf5BbfMct5mH6-2BqimR-2Bp9ujc3yw7EvOrpC-2BjPX4MoTD5rxnctY6KIj3d2jWA8ahf40-2BFXP-2FU0arqNZnPWwxfDr8QPY-2BNg-2FZPzlPwZ7pYnozrgELUEWsqn5KcqCPtWOh8F2THLFAg-2BPturdV2-2FpP36iYhajxVuJFWK5TEecxACoVqnSew96IDcdVV7nsKiduyHL6IB6Yb-2FRpKB-2BDVbFhDoOFpP7tH4KTWTkNp6-2BQt2BFg-2Frd-2BJ-2FvB9jmCMPOmHgY-2FPocVW-2BlSNEzcRPxoT4WwKQgAGfGaeFtzSEpPdBVE-2F0pQtwuM138BH7WQdmRg7zreOZNuoAKrnv-2BWEyrdq3nxAEleTTqFumnehT3kPXTJIktxebC1yCIVtFo5HRtnLfZSxSsPdz-2FL4w-2Feviu-2F4sY06G-2BSVMm-2F7B686lqg3EeiTd-2FY0aILnX60zGwsgx9cp64GLY-2Fl1ROnW0weFwrSAi1JRVrTFovQQDbycNTj30NZMwai5YrKeRaOwbFyqxKfeVup1hldcbYXr9cdXZaH5Db2SoUHZtQ-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241107892127561" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3352 chrome.exe 3352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe Token: SeShutdownPrivilege 3352 chrome.exe Token: SeCreatePagefilePrivilege 3352 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 396 3352 chrome.exe 86 PID 3352 wrote to memory of 396 3352 chrome.exe 86 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 3744 3352 chrome.exe 87 PID 3352 wrote to memory of 224 3352 chrome.exe 88 PID 3352 wrote to memory of 224 3352 chrome.exe 88 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89 PID 3352 wrote to memory of 5040 3352 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://clickemailmkt.ahmsolution.com.br/ls/click?upn=FAZ9Oj6UHbo-2FUBIZwgcdILIk-2Bu-2FC3uvNwV3SW4NhYTvQqJ7ilBZvJtA2JVw5J6uZY0sV7-2BDYTYzQwoHtUXSjeE7qzD5hdb69qY-2FEjBMWmQow08FPHm1s9R3Iz-2BpCPuA7yxqomXLeVysRqFvLeJCv-2FDXOX9x5nHufB8DWZnZ9lBKOksUNDK4vzxreagndeRmqJM7sjyeH-2BGty-2FFLJdCEViJABrDfzTYFI93lCiYc8jNSdwWSi4bzk9XZayLQSEb5gt9hyWrTRDCmFZcR7mU6JAqGMj0OvmVSgn-2FbAM06ye-2FWsG-2BLk0rkMQJhssXzv3fNi49XfJIOQ35hSAww6Aefthg-3D-3DIZEN_ArY9ML-2BImYTkED4-2BfXS2Ct3CAhGNXSOYWBLn-2Fkt76qYojxTch0qFTfarqzA4Txyc9zyZaF7QoGkqpwltNtmMLHJCl48xa-2Bu8ztGyY6-2BQkCkgsMcNt-2FpWw2n3tco2P7vlA-2F7U7QyRp68PiLNPNkMEIZUer9tCxxHE-2Fqe6sQXcgDsVQul6ExMHr6dmlOGFf5BbfMct5mH6-2BqimR-2Bp9ujc3yw7EvOrpC-2BjPX4MoTD5rxnctY6KIj3d2jWA8ahf40-2BFXP-2FU0arqNZnPWwxfDr8QPY-2BNg-2FZPzlPwZ7pYnozrgELUEWsqn5KcqCPtWOh8F2THLFAg-2BPturdV2-2FpP36iYhajxVuJFWK5TEecxACoVqnSew96IDcdVV7nsKiduyHL6IB6Yb-2FRpKB-2BDVbFhDoOFpP7tH4KTWTkNp6-2BQt2BFg-2Frd-2BJ-2FvB9jmCMPOmHgY-2FPocVW-2BlSNEzcRPxoT4WwKQgAGfGaeFtzSEpPdBVE-2F0pQtwuM138BH7WQdmRg7zreOZNuoAKrnv-2BWEyrdq3nxAEleTTqFumnehT3kPXTJIktxebC1yCIVtFo5HRtnLfZSxSsPdz-2FL4w-2Feviu-2F4sY06G-2BSVMm-2F7B686lqg3EeiTd-2FY0aILnX60zGwsgx9cp64GLY-2Fl1ROnW0weFwrSAi1JRVrTFovQQDbycNTj30NZMwai5YrKeRaOwbFyqxKfeVup1hldcbYXr9cdXZaH5Db2SoUHZtQ-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe768e9758,0x7ffe768e9768,0x7ffe768e97782⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:22⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4524 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4764 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5036 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:12⤵PID:616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5240 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5988 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261B
MD5ca3ba985ff6762c3ec28e541d323c5b1
SHA18a1c86c5cdb9d92c9672f6ebab1b217887e52798
SHA256c6d9ac29b7520670ed159c17ff192b6468f269acecd2db71ce80315ccda40b2e
SHA5123efbd27933922a46d0107224c9aa2cedfd3179ed70d6d5b403f4cccc8a6cb57dba3ecd7b52c1d57890be5858ea47089724489a864e02cb21bfb2667653548aaf
-
Filesize
552B
MD5b436503be2aae22692b5b2fc3463223a
SHA1fd344f9d51f81b12b2cb84d9ff2d7e3312b9941e
SHA256f40e7b2ed78b16cd437aa87adc54d92820f56b5ca5b75655daffec3bf4782ba8
SHA5129d0d3534572ab22fe337efd8dc7755e04c7ecc15717e58dec649b02c1da0dfe4e1fa63b15ba5e9f21bca25abee580eccb327abdbd27634135bf4e48e61e4cbae
-
Filesize
1KB
MD564ac9745ca169666016a2fde1c60e113
SHA17759405c7276e942f25696e100187616f13937d6
SHA25650fba63d4560c1a5ae94f52166760c9eabcdb5d21be1480e56a79d572c7d5407
SHA512b4157b92862b43ae542366ba5d321728e554809fa6046ad6b0730fe7c59848c0cce241000e3d91e25b81969f6fd36e28413c76841eec8aa381c29c41a37325a0
-
Filesize
6KB
MD59ffdd3290fddd436ec6f2ae99d8bdf9c
SHA1216efe0f1d21111452ddd1d51fe10f8dca0cd148
SHA256d926af1ad84aa927e81330d397c16e4b971610e7ba9ddf36eb632e331edf20e5
SHA51239c50c1a0ebda0af5aa9376327a7792fd05029ee8839e47eb26a662d4bb97650c76ce2bb59ba0cc4764227f74d82d14a3568f27025de0444adfbdc3d2397a2ba
-
Filesize
15KB
MD5bb0ba5d71739d70532a393d17ffd54f3
SHA16fa498d1fcf2f3c5080dc3a4cf6bd183db187025
SHA256477c96849d4410cb667ffdf2d6519f39c799dbfbd63a6b51633a2d0eba472cf0
SHA512946f88b58f37f7437a95570b4036d77af8e1076be1f88143170e57be2836dee403b948cd61ec84422ecaf1198b378f6ade96ba93055844766afd6f950f8fc454
-
Filesize
145KB
MD59183eefa9fcf9734d9d8f301d0ac03fa
SHA130d2f4986c6a10ef8ce85fe62a5d96e297ef3b09
SHA256d19bfa97f6261182e8d50e9dbe9d7a0ecc022bc9df5c4572f10796ba906d9e82
SHA512810146599094e9309d039a6d6faba3e14e33d2437c9d3e66dddbf783e5adeffa0fb156a38691f416ab47dad567cfb25199657089003d4a4df99676c0fb253db5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd