Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
oauth20_authorize.js
Resource
win10-20230220-en
General
-
Target
oauth20_authorize.js
-
Size
26KB
-
MD5
f5658a3d5b51b89de2593a6ca25a0368
-
SHA1
7e58ef6a2e7e8a9566f19cf4e8530457ed44a5bf
-
SHA256
a369679b6d4a75bdb08c5793eb7bb75e1b9dc622ae8c6cfe5ca19bc6bf0e1048
-
SHA512
b2dd7fd4b185d0133dcddc00e43898b60f19e54a1513fccaecebd788f1dc51dcf228de04136caf19e81c6257563832966f02e46c2ae8ea327e493c569bdad938
-
SSDEEP
384:++UzR6ARMm71PrHh8cQ1upX9uZ65l3YuuASzc3hj+1d5SzDn:foMAdBrBpoawzcRUSzD
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133258333685777708" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 612 Process not Found 612 Process not Found 612 Process not Found 612 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4720 1508 chrome.exe 68 PID 1508 wrote to memory of 4720 1508 chrome.exe 68 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1248 1508 chrome.exe 71 PID 1508 wrote to memory of 1104 1508 chrome.exe 70 PID 1508 wrote to memory of 1104 1508 chrome.exe 70 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72 PID 1508 wrote to memory of 4796 1508 chrome.exe 72
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\oauth20_authorize.js1⤵PID:4176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb25a49758,0x7ffb25a49768,0x7ffb25a497782⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:22⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1492 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4376 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4320 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4676 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4928 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4812 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3232 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1764 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4484 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5220 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1588 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5284 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3316 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6036 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6088 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5172 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=2496 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=6004 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=4368 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 --field-trial-handle=1820,i,792985481767233316,15773293836544947146,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5f95bd837a2ecc8816265be66453d46df
SHA1c901c83fcd14fd1bb69b7a0c1ab183c2a8ef0e2b
SHA256c265438144bfe282937dcda65883089d30c85dafbee7f00abda26e53efedf54f
SHA512ca1d7aaf286f7a7f469ab830a6ff2d02c2c6a4fd72dc639242b1e8d8d543eebe7247e7e4fd466f24883b647242ddcff6bef1eba4a7afb040b3fe95c31c59d22f
-
Filesize
201KB
MD5c85bf92317f18838af8633290d7bfcd8
SHA149b34d5454d97ba131be2470c200ed8355d1c11f
SHA2563cb1062004b6738937c42ec9cbc84fd38b233877aedbe030c193522a89a57a6c
SHA512019a281099ed4f67293e506a7531b18fd1ac42323dbd464d95fbc98c08a5bd50664a95e357c59001c2556b386ba80849f6cf908d6e531f24e81058e075e91446
-
Filesize
64KB
MD51067041b8fa46bae06ebeac837cb67ed
SHA19a1e51cfe25d04692592f1dc13ce75058db813d3
SHA256e6f3a928b555e72664e65ac8d3455b7ace51ce76f205975f98daff89b3a5d533
SHA512d16c71f87ebcdc4553cb5aa4283f84ba02178e80d237a99d56ec416377031af4354582d459abac88df5b06239e3fb4625466b478bbf67ac5f6f001e82fa58882
-
Filesize
37KB
MD547ae9b25af86702d77c7895ac6f6b57c
SHA1f56f78729b99247a975620a1103cac3ee9f313a5
SHA2569bde79a1b0866f68d6baa43f920e971b5feb35a8e0af7ffadc114366f8538224
SHA51272b5296e3dd1c5b4c42d8c3e4a56693819779167b9f02bc2d5f5a626b519a9cf10bee59846d614c929c42094b65d13039f6024f6cb1c023e740969aaefd060c4
-
Filesize
446KB
MD540ee6031e5eba5b45ec6f27ca31b2aee
SHA188159b3e9e2bc7b2fcba1b1a594823bb697992e9
SHA2561505443d51cbc6283f06918404908df6604ba9572f4e4f16e25810ef15631871
SHA51296cec9d7c46d8588aafb66f7f7d3ecb162c39abd47cbd83b98abf5898c9d0353b978894ace8cfea7a7fc513940215e2a14caf06a74e7fb54234fb86ee74d7193
-
Filesize
624B
MD52b98b686c8fbba2f0ca586cba6fc3793
SHA1567bd0e666daab2e10597dc81b901731c314f094
SHA2561e197fabc188bd45ce8534b3f60d14e45dde050f12a2b3ac00d9cf97fbd1974a
SHA512a3f04686e2e5af73f3239bea04694e123b4aa243ba6aac1d3229a07d5d46ab695a840a90e2c02c50bbbfe7d9ce30504625799900073245574e7b6e8a7326e027
-
Filesize
1KB
MD575ea42acc7e1d90455e028b987c75a90
SHA1ee618f1bd5c10eb4a56ac8d9b0c74561769fb0b5
SHA25683111a69cfd73ab316106895f2ddd060d876fc07431abfe7971dea17c6f8da56
SHA51201f4c14a80b88d26484a22a22d6338d2fe76e52b5b659439d991bf0a5c35991af8491ac86df2c0186896d27ebce7e6ee3173fb6007cc515d1a2396cf9916a0bd
-
Filesize
6KB
MD53622adcab725a5765e0fddac177fe571
SHA13d24f19e61fa1253c704dfbc706e36f77f84701e
SHA25638936cf08a2a09b205ffc011ee2187448bb13126b07f8f849168e8a0379fc0d7
SHA5128cf7fd8335c1cf8f393f7422ca43ed592b4522d850a90b472edfd4dc6e3340edf49e8764fd19f3b0ab1b55b4c67f11b0b876d09e79511306a50223554ebc36d9
-
Filesize
539B
MD57b114cbacc7034b69131fb7dc84ca53f
SHA1be92f79b362661b53511ec2a704340efc98a0865
SHA256b75acef37dcb43fbb461bd3143ea7cd2b972d72b28d5b75b3ee1e049617120da
SHA5126f38fbcd12c18f0968b338bd58fd484c70a2d54487ffe91955578508f75bcc22e4efa81e2f799374cdbf7d5128465426a53d34c52a995cfeead3f49f6492b7d5
-
Filesize
1KB
MD5068a447ad1db47e1fab181bd13bb5b71
SHA1efe68d73956e604e11aa6e800f430d2b9ce4dd90
SHA25608bff9129c2b19cbcb37dca36e3d149d3ce824cafdbc55061a9495bc3fc08bdb
SHA5128f982790f071e8275c8f277cc3204c005c0cae458b1b1160e95f97b2a1e0d288bfc85c901d52bb3a849a976c74eddc7f4fe460ec06d3183222a1e5aaeef08e7d
-
Filesize
539B
MD551d7957df54242fe1194979aee90c5c6
SHA1802648b98e477fd59852d0cb57a4f3dc492589a9
SHA2562f32b6240fc9ca97268e2a56a4ff5390224ccb7eb72bf62b0c3c81a2c8cc9089
SHA512cda81877d2da55c529ec8fc527ac0a85ace28e077899dbeba67c8f6df546a4f744b6e683bb80b618113039e46c51c0d3f48820b35d0b331d6b3dbbdafb68d3a9
-
Filesize
707B
MD557e10dc16158b6e450ac56f27c34bcdd
SHA1febaec6f79ea063597078a49d01814dd113af021
SHA256b4d2f09c2ba54a38668ab652f26ec7b66542d785058eb01d80778d807fc36918
SHA51274cd799d5fcd2ff9a18df522acee7ada02b2e42ef0a3651d17c396a687e5a02f7534c90e2a2bb9f87465fa5c13a7469b467b279b9ae95842f12c4012304897fe
-
Filesize
1KB
MD51c11a641bb33610c1f5ae32ccb5d5ccb
SHA1e9ae0fe2321632ece465cc60493dc175462ac3ff
SHA256841a9ef58bdd5f6b9f58f737215c88de231d526967824bac58955077197b931c
SHA512335b41d358b17a015942cb2968d0af10c6dee166414f33a0ad49189b48761b24b421efc849ed7499e6b04c7dbc45eda8854792813fa861ff2fc2df4592dafb88
-
Filesize
1KB
MD5afece32be90c62b3588b3acab75e54c8
SHA150901f562db869fb89492ec1ebc3116e78c55af5
SHA256af6bc5b338b912d280ffddff0579bd106eedc3f9885abef571743cc4eb428c2f
SHA512d1faf9e1be7676292b85e697559ce3382de5b274ba646d2a70948721c83f8b263792e534ba6bcf18eed20a73eb29075e123922aae3519109ad6e15fd2a66dc5c
-
Filesize
1KB
MD5e80849e0fe06035a20ccfa104c941da9
SHA1f87ece63f68cc14a807d5aab4fefd1985d42e1ec
SHA25622529757428231cacace14f85116aa81894c07320f188612ac18ff8d0c6d95ca
SHA51260b8b100e508ef54a2f41a5527045c63e809f7c0823144973ecd6cc2444579d0d5addde2949cbdb2916c75c7efc965e26cd15cbb4d6cce1efa17d2dd686c5fa7
-
Filesize
2KB
MD562c7d68010aba8ac37992a96530aac21
SHA136fd4ff2137bfb5e940115e3698f4f35fdc65b27
SHA2566b2d6b279aafda333350db72f25a131b7590b5ad1f42dc3f65ef81bfd48e0846
SHA512ebd5cec91bc136ff39768ff8022ae0b479ccfdd4697ab6af582612f0b0495b13e806252ace7d2cef53ed73cfc851e980b0efd1208701c64aa4d05581d531f750
-
Filesize
1KB
MD59789d0a45e8000b6d68b960070021461
SHA127b127f4311b002eba86e514168c3358a2d8b29e
SHA2565bd833152fa9efdb4794fa924ac253ae2d562e26d38a79c2b52cda2fb59d0729
SHA5124653ebafea9b18607894040b1f9ca1d31a87541f4c1066ac3dbcc51aabcaa2c7871b504759f6638841d7998bce038d9b0bd8d2234a3e511e0f8de9d2974151ce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c6298f13-8d8f-42c3-8c98-50deb8291a57.tmp
Filesize3KB
MD57e29e28aa85ab2c8cb8efc0aff9b32e9
SHA1c000dc0bc97b212a92f906247749e45289f2f374
SHA2562796d3f2101e9ba5b17ba37fb8f1a786b8bfa68e11fc44b35ae9af95085b355d
SHA51251a32b33de12b447921b1fed45650b8b06f0d569c0d759ef4e74118ca4857e16ed2c8b1c9822b22e0a425ca871e56cd818d4b6068d6bd9173300dfcd698dfb44
-
Filesize
6KB
MD5ce6d3343b4039fa91cf12bccb4c2d282
SHA1d736838e561f7fc385222a92b4b02f219138f40e
SHA256798ee183f93a9fe6a5fdc11e28fb286902833c83ed23251066d2e762b1227d9b
SHA512e9ed2c35b9e469e7f441f385cea124d46892af9427d72ee5b38e66d0e9809aa9ef9dec85a9fb0279c58482e91087e80f9059286494674b2a2b58373e013af636
-
Filesize
6KB
MD5aad4611a069c75422f683abcda963f84
SHA19629d57b0b07a11914ad05a0df76551df4245aa4
SHA2563ee89ab8c516a1cf714fb852e6626734c02ada7cd8c24e970bff86436b8d5bfc
SHA5122a1311cab34bc9f197e53c000213eb7ec4183b83d7995f6a0ab2fc1079aa19c1423a855936554df38cab176353e5a0c1ef4256dafaa8b875c289d263ce6616d8
-
Filesize
7KB
MD526f6ed152d06200aaaac26756b85e860
SHA1d09a86b17e75911eda7e42511a482f1bbc8e8efe
SHA25625637e0e10e8f5fb9a3f473d4d575a0d3a5a7ddb73edb40ede2071fb430835b6
SHA512466d8da5f298b8238bc436f17fd81e1b2a6ae7ff07701964d9111e8a3d8005902a40b8d4bac245983899e1372020969a24e97d8147245ca9e26f6f5ae20b98ce
-
Filesize
5KB
MD50de6d1ebc1ab5afca7f6685ef3e436d5
SHA1cbc1c692794983f1a0298962f0d367a9af8fe2c4
SHA256566ae6db760a8e40ef39d61162ea0948a085c6bfc6c80f29959c3b9f5f2a6125
SHA51295bc436bcfb4897da7a0160137b984bbd9afcdf895c4a88d288982c86af22c0c340e053a62999faf1436c34a556dff9c5c013c7e4c709112a6c81363402ada0f
-
Filesize
6KB
MD52dedc6fba87c5c7828c2db25904cedd0
SHA1c53de2e175715fab353902e2a7f1ea5dbb4c7d1b
SHA25643a6dff148d632b582ba720678e9b828221d123b883137b39d8d4b5c80777e2f
SHA512e48fd2a88cb41c2edaddf970e39d5fa2f8931d3a4cb1cc5a77d984959ce05dcee9e33a594d672879ed7c3ffca718d131c60788b0795625cb6f96cb61239bd856
-
Filesize
6KB
MD5c48b1978490088540310474098f127fe
SHA1ffaf189f2016dd475e740bfa2c977b8f29f155f4
SHA256442091e938999469e1edb1e29e25267a5f38d8b76628dae3ab2ce1d973e378bf
SHA5123e8024f725474b9a8f478e2e87d5651deabfd2d8ba5458e4b4650d9b4c68de86f42bdb817017efc15d5d18f3d389cebf1f2b4e896676ff0ebe2c50dc237d6e77
-
Filesize
7KB
MD5a4192057aa7937eb89cd701d93366364
SHA1a2d9223ebdc98e64ec2abd2bfad913f9255e5fc9
SHA2563d51006a5fc0720c22553f22cbb89a6458326fec9b5dd96a01fd70d311fd540e
SHA5122258184440c5f6a2263690697be98157019e61eb65ab77e064f7e29718e347fe08a13732798f30e3ecdc9074228036fbda7e0829e792a0700c794c4b82e9ac09
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58339e.TMP
Filesize120B
MD563741d6e1caedaf748afb6acc9c40d7d
SHA165099bb2227b4d6b2ac956a92d5e5cc4da80127d
SHA256119ab1797213974aa0970bb8991050273c08f45173f5b422d371e98217436793
SHA51278a41a9be8b856552130ef730323ba33fb510c4084d5ba918541536d7a29dce84a4106be83686d76c1831f7a4f8bc83ebaf81ede5217aac1fca9c9a355d67205
-
Filesize
72KB
MD54528dc0db2644b655679f13c63e81add
SHA1ccc9ce07d326431c7e168a05beb4706f0a2d1622
SHA2568fd4332539ccd8ac7d73dd4408db027cf74a53c8da4d4ec78729a67ef5460144
SHA512e205d967f4be7c8d9234cffc4e0166ecb863c7f37812f0d9ee4e4cd3045f2a29cfdfb98c4fc868e21445e353738128d266d8f6a5a9a84b6b1591133ded7f23d8
-
Filesize
201KB
MD518c008cdc80554c3cf3d1c2a78f7aac8
SHA1c9454c99e9ad62b08ef4d40014c3046306e9dfd4
SHA256da51a9e4eb66a843b96db764beccb613c253dc498595895846c373fb5077ed9d
SHA51294fb95d4f4f2a7dc5275c0d5395841153fb9d53ff60115e4aa9f0b328b802b9480a4c4bfef8247b5ed84ea57641b28153bcb6c6b6c37038596ba80969976be27
-
Filesize
201KB
MD560e8d7f3982782a7cb9029a81ad38b09
SHA16503770c97456213d1283199b7afd532b6bcafd5
SHA256901839e0425b809ec1c082ec93fab981a1dfc2b1fff2fb2531adf18868743cb4
SHA512b1b5d91afaa048bd0fd5d07bd722a9dd6eec46bbde14055099e5ba3db8eb6d970dea94b8a4c9606b58c96a4de4e8411150b7fb42cbe6e025034158e61630c536
-
Filesize
201KB
MD5c3f79a7f8dc32094081b3c1c5ff7c46c
SHA180acbe38ed10d2477313505c20b58004155d060d
SHA256dba16a4528cc4b8e26dd48af8cc118aec9c3215231a1604ad8ac66ad2442de75
SHA51271a631a42ee0a507746625fed36aeca0527f387a671eb8d81e80cf08014b5def8cfc20f53f17cc4510233b725b068aea38bc30d6ba9c5c870f9f72f2d99096be
-
Filesize
101KB
MD50e13117c62367f5ff038a22f4547faf1
SHA14de8f685ce5f7c98290c8dc60c435d4151e6b0db
SHA256b37b41db1837f39055bb99ecfecaf54c57ae5769234a4b3de8c312fe2cfd471b
SHA5120e81c15c8ee11f5cd5e5f2311cd393d41b6b636f80c6ebddc9f76059ae4448ed5f6cec195da6c1150e90047deb9c5cc664d3e6a0d4464a4900a25c47da206573
-
Filesize
105KB
MD5609ee69720f60dd3339f3c5783e77a91
SHA1665c3d0de1c2f9ff0298cfb7d683a99f3f9b5ce4
SHA2568baa7b311ab33719da49f1454fa4df2e5b7931ce35856f05c35220356947fb10
SHA5128955799b4e4ded8259544e40d917b8fb5ed123c7586890d6b528a7e74fbf4bba4549c9dd6f28cdc020ad937416f5b97488266ad7424bf48d26882d3452ebb165
-
Filesize
98KB
MD5db338c78ac753ea687f95c7824a72508
SHA11109fdc4fac3a00c54279a37360a07e22323592c
SHA256b870150939ae14c9a6c8421ed00bbb947159a94a4359bf46374fa2e51781b382
SHA5123ba279613dbfa68e6d6a0f905b09e6bd8893b22e99754d4cce277647d48db38ac16672be8bc3edb6e4f95cde9132cbc138aa354ce1ba799dc469bdb92196476e
-
Filesize
93KB
MD5e8eeafd4c33744e4bc5ed8ba41b088cf
SHA11a5d0f54a1f3231923451025710bc35eca8c5980
SHA256e82472e8e5c43338277263de97668ff9bd5400ad0314b3ec4bd13dda5946c6e2
SHA5120de1af2a521e06a73974e82355e69a38cc8771265e2302601f04972b3a22a9227cc4ab8112056b4e3d709d2baa2a7476b4aab69c47168082e556c53b66e90cc5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd