Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 16:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://b
Resource
win10v2004-20230220-en
General
-
Target
http://b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000016b1b6fc7cfc59429b2ebf78760d5fe3000000000200000000001066000000010000200000006d5951b8d97de33bba633d348a4c5d14e58611210fdb69659c74db80d9411b17000000000e8000000002000020000000427aa967f27408a3c11d9eba9d45f959b0ed2b3342545acef1a6a8cd6a0db52220000000b7846359cdee871bda407ec63dba3f80f2cf1c8119bf52c6ccc63762cf349d3440000000e3dfa18ba74aab5fba91e23013fa18235219e57d2e2d5209c2b41ced1c0d06e77f155259501939b8cc8b28d7e5e446084a37840bc81eb52be4cc78130a545ce4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ACEA95FD-CFF0-11ED-9EF6-4221DB3A75C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007b7186fd63d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000016b1b6fc7cfc59429b2ebf78760d5fe3000000000200000000001066000000010000200000003ed9ee2c680354fcf3e09e5337c39748cc806f95c9395dda481b3a8022069595000000000e80000000020000200000009f81dbd831c7f018d7c47a1f792d9a43e57c17643d77a77866c2623b71ef4f692000000074c614341748a66810fbc2270d8692b0c5f7c707382ccef212a31f3d16c5a766400000006f174906ac987d1836603a72b06a0b22330e79a4e9e80f972a86e35b29c6bb254f2035572a1075c332780931658c232378566baeb06cc580598e51132a77b919 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cf5286fd63d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133247604488344355" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4016 iexplore.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4016 iexplore.exe 4016 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 2136 4016 iexplore.exe 84 PID 4016 wrote to memory of 2136 4016 iexplore.exe 84 PID 4016 wrote to memory of 2136 4016 iexplore.exe 84 PID 2420 wrote to memory of 1132 2420 chrome.exe 88 PID 2420 wrote to memory of 1132 2420 chrome.exe 88 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 1324 2420 chrome.exe 90 PID 2420 wrote to memory of 4472 2420 chrome.exe 91 PID 2420 wrote to memory of 4472 2420 chrome.exe 91 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92 PID 2420 wrote to memory of 660 2420 chrome.exe 92
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://b1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4016 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb725b9758,0x7ffb725b9768,0x7ffb725b97782⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:22⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3264 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4740 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5132 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3912 --field-trial-handle=1812,i,11876923967230235502,18253631184863987954,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2c5f1476-ecba-414b-8a12-f7e6450427de.tmp
Filesize15KB
MD5785f40a55be4546ad3edd11cf1bd2712
SHA1f42040b3ad1de1266957c899dd1c792bb7cc5f76
SHA256c82f31847d50c6cc2cb0ee5b69556bbabdd06594c24923bbb591d1a294bea1f3
SHA512508fe719b15418f27cd6a962d16a4cc0127f77906388b7f5f451457878920cab6fca39c8ce0a5d02b4fb88eb717b8c8fd9abafc9760ddfbc25de4872e2aae958
-
Filesize
144B
MD5b4a24e3864ebaac286c09e8de281a29b
SHA1d85f0821a6df57dd3d6a2a35778613bc55e8713e
SHA25633f31efb1154d265a9e9a9fedae352b679832fdda5848fbc92a08585b28afe1e
SHA5128bcc5ef10c0d89d763c098d74db8aa88876310f12ea0cfd0c3a4a906dc6d63d1f037940983734f904fa110120e864604e25b7d80e22d72b1d2546c5080922333
-
Filesize
1KB
MD5b807258718d040d0f7e2d2fb47d93ff0
SHA1214509a5f9f39048472e5c3de50b568e6394ff36
SHA2565d953f4b36e9e70a9f8d8f3eac2f38711042448ccf46bc842c1cd45838de3669
SHA512487e1423ce4b54344fc10eff6217cd283940abfea28f4f963a97b246cc56d61d561bf894a43ede9919d92c5b9cb728bb42145b8c758eb2439f5eb57837113a25
-
Filesize
539B
MD589594b242e10f7f261f4db26efe7fb8c
SHA1efe6b9fecde163d19d5e984451095d30f817fa87
SHA2566bb2690d7bd94224841b59f90f72d5ab2ae4084da75c8cad3b835b06e90fc11a
SHA512210abdc275bdf70924153d613a25eee6d92ed0d25402fac8fa384eca7cfe96c1079c1e0c5aca08e708f97d58b6458c522171c24b493abbec3f366ea7ca373e16
-
Filesize
6KB
MD5195727a28725b6182109d3342391b629
SHA12fba10ce470347f02b70cd7c374123a203d620af
SHA2562ba7606b9a089d797116b4693455c7431cebbdf2e6f11f08aa6401b94a37c9ca
SHA512a1c81b9c775230927ca1d48ade36bea787879b39c6b0dc37683b42f9ae203714f98ee7e5a91d887b88c8ccfed358104135d0a0ffc552492688947138163abaa4
-
Filesize
6KB
MD571e094e010ccaf582667f072ef164685
SHA1a31b4a9b3ab97ae5ec41a8a127c2b7c955d05130
SHA25604e3c3deecfaafcf8ed76459e6b54398cbe6e0fa25bdd49f0ef32f5710a42d34
SHA512e9109d07f9517b09102123513932ff310dad60b1ca4bf34cf6b955643a57358b02d6db6fda7da05c3fe8fa876a7d1030b60f76652fe104bf0694d8476719be5c
-
Filesize
173KB
MD5ecaead8f8935208c919006e23dc71790
SHA10ed6ab3070df4627be576eb3a6a663bc09d7f4d5
SHA256d4e13470ffb205e2235a90cf84f4dc8b62485a98cfc545e11c6c36436c99a58f
SHA512d4931d6fbcdca72a544d39e6dac8a74e54c7ffb4912113c8922542a6f831c9418a78c76c7867f5e140ae2922aca2d9a5820254af9637d1d05f9ed7feb5a6c63a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd