Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1797s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 15:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youtube.com
Resource
win10v2004-20230220-en
General
-
Target
http://youtube.com
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7065adc30b8cd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20eec9c30b8cd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E06371EF-F7FE-11ED-ABF7-EA1737350EF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000675316f82fdac74aa8f3bd7995064a9700000000020000000000106600000001000020000000057646d9385821db747d77973dffb69a2464ba57ac35130b72b16e187dad0663000000000e8000000002000020000000236522a6bacdd50e29a150a5b3091dd9d4d5e440359869a2d46a36745bfb213620000000033217391bf308865072429410f5e1bf063bdc556f010b22d156505cf56eaf9d40000000699d32c860a30829f71d426417bfbdae419440663e9f96fe19c204c0534148893a3281095015ecf6d1e2f103ab92cd1cc6add282f5bffa4bfd33d973be14f9b7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000675316f82fdac74aa8f3bd7995064a970000000002000000000010660000000100002000000052e11ce8b086e2483a54a97fbc3f9ecc7b505343531e52f5e0800fc152f30c06000000000e800000000200002000000050b9755253b17a3f33817737b3cf36fb3753865701d349ba6571826324b64c1d20000000bc8bd47d8a90a5c64b8c79b8b88d9cc2aa13e086afb680039282127c36a7eee5400000007009f05f6e0f3f9a67dd3deeb582766d62f68e630b01f7ea65dd82ee8b1ef809aae216c786e8d583400f82b65799280a147e7598c8cbacea8809459146caeb4e iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133291645970985720" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 668 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4180 iexplore.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4180 iexplore.exe 4180 iexplore.exe 3916 IEXPLORE.EXE 3916 IEXPLORE.EXE 3916 IEXPLORE.EXE 3916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 3916 4180 iexplore.exe 85 PID 4180 wrote to memory of 3916 4180 iexplore.exe 85 PID 4180 wrote to memory of 3916 4180 iexplore.exe 85 PID 3956 wrote to memory of 3884 3956 chrome.exe 90 PID 3956 wrote to memory of 3884 3956 chrome.exe 90 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 2700 3956 chrome.exe 91 PID 3956 wrote to memory of 4760 3956 chrome.exe 92 PID 3956 wrote to memory of 4760 3956 chrome.exe 92 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93 PID 3956 wrote to memory of 4484 3956 chrome.exe 93
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://youtube.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4180 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffdff889758,0x7ffdff889768,0x7ffdff8897782⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:22⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4080 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4196 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4832 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3448 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4864 --field-trial-handle=1812,i,2477162923484032173,8206986479270302492,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
646B
MD5bf3684921af32fc1ee049ac6e09cce4a
SHA199700046496fa4a4203d93343e72c58f3ba30d83
SHA2566b1d969729e36ce2499f7a7d157f0d64cceb4ff2fc14672fe8dde9c7c3852c6b
SHA512062c9cedab361f848b14d7a507c96292772d3a2c58d202182b5476448c12a7ca2ebd57f1dc808db76e6381ade19b587c936a1b0bf1508add46625dfed9891fc2
-
Filesize
6KB
MD5ae5ae6d42315566e8b737e3a9b0db9c6
SHA17b8ee7702888647141e2bb06d028b23f529b5751
SHA25622d0a9f8df2c0e0f2c4f498a235d6074a2ca351c6f77b5c188f872f3f7ba1101
SHA51237c0c6b271768d61bb75e561b218d054815172bc3a64a8c5d3cbc54a4c77692e593eb268baf89ca91edbedabfb8f6a78d6771f627a65af9c814c58c0225bdaba
-
Filesize
6KB
MD5a17cda6ae517dd22def1ed872018e99d
SHA1400927296307010586a4d017de538b8f3734d972
SHA25633f21796e1f5b6b9a7e53ad3333ffaafc39f86979dccf932c242d7378921a666
SHA512c9f927c27249c8d8ae7074627d9fb9c972b09277c329253457c594ddeadb17e4654722f713ae84b39a7473486a4e927e434de395f08604e165dc5d1351f5e056
-
Filesize
15KB
MD56543b569789399685728af805c18c941
SHA12d5eeb2057ec5736d1e856aad50c649cb291b082
SHA256333f065295d916f0cc3c8f31d8c7a8c4c06f3f263c987c44f334b9862c238f71
SHA512d014e967eb54127682984499b5dbeb119bbebbbe8fa63287c7079f8aff6fa02fce36dee26f652b2a2f7c89b56de5809d590abeffe1b64b694906b6d59f2c12a4
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
71KB
MD59efe2549ff75c52be9f8d20883c12170
SHA156aac3e66f7d179fc0e8ca9f46043fc99eeacfd4
SHA256c3898ca6f4db73249f7be55e4c4ee90bc68229104984fb492e1632af37c1e749
SHA512af7a9389591b5e19411a5cacb4934c4608f71ec2c4464785d63f8b588aabd135e47b0b1ccf709c6d59be43960b2fe621337f0e7efba30ac4880b471d5d83382b
-
Filesize
71KB
MD526aabd64c948330dfa24a4d990867f5b
SHA18751c0c0f38aa72807a50e13d7884ce9939aef72
SHA256636bf8cb798cfa6652e2923274814ea766f41b37988f3096cfdf0ced3f9e7ae0
SHA5124277a2d95dd704bed6a2b4ac8719a59d9b7258bdf1f1050ae300bca54b21a6305ce3df4c3999f72541832013bd1b12fc7c0ca1249339e21a33708ca0d169abed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
16KB
MD561bea82b8e8ba4ff39698c51225296c8
SHA1f24785fec0396f03e0a1259c0441f5973b9712e2
SHA2568ed8697f60f13520d4456c91463d6ba134580f8637f96cb594b25da77f4d92a6
SHA5126bccab4670276f1a7958629ad44c90531e3634613595682d5a99e39928a2aa7f604f40dc4a307bdefe4af85b465d3bb3b6cccddc13e7b8f05063ea37bb9fd723