Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
570s -
max time network
546s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 16:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.alamode.com/?adcode=CPEMAQM0913_1&url=https%3A%2F%2Fvo7fw6.junkcarsquickcash.com%2F%3Fregister=YW1lcnJpY2tAYW50ZXJvcmVzb3VyY2VzLmNvbQ==
Resource
win10v2004-20230220-en
General
-
Target
https://click.alamode.com/?adcode=CPEMAQM0913_1&url=https%3A%2F%2Fvo7fw6.junkcarsquickcash.com%2F%3Fregister=YW1lcnJpY2tAYW50ZXJvcmVzb3VyY2VzLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31034585" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034585" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "757631150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "769131451" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000281f83ed062a2f46bdcb72d07f39f04000000000020000000000106600000001000020000000775e7469870c3cab3185fc18524822a44ddeea62afd0ddb58583f5b48d9eadc7000000000e80000000020000200000004a9fa7b170a737ad86d9233f8a5401f070120c3a084bcc722d373dd1941078e0200000005cb790312f389a40525f1daa35afd1894277002670de064d4faec9dd7d097a85400000009f05f5d06130eb361bce1ae146537c147435649842393d7398fe65b9e24999a77da1fa44f7690b038a159ba814421a2d4e6300eab82158fcce76b7873bea03b4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0905831d98cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000281f83ed062a2f46bdcb72d07f39f04000000000020000000000106600000001000020000000360a880a4d0448f370061d3a0c9c4b663683c8643b4baef10a8a0e01f7c7ad28000000000e800000000200002000000016cfe7f80012865c5fb358c7ee42ee19ba4446fe074fdf645355a5398010ae8b20000000aa5a4de20e7a8f30e0c8835af89159ea8916b34d2ef0140cf75edc2f7b80832640000000231512fae1b0545f79bc4b73a222d3b8bf12094a0da1b4097f392ab338b15bd59c670e52545785cbaa29aaec3090c8e427dfee33f74e74f991465970c4606e6d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20344331d98cd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391544181" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{58593888-F8CC-11ED-B7D7-5603A1288413} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "757620997" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292528277214290" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4508 iexplore.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4508 iexplore.exe 4508 iexplore.exe 3348 IEXPLORE.EXE 3348 IEXPLORE.EXE 3348 IEXPLORE.EXE 3348 IEXPLORE.EXE 3348 IEXPLORE.EXE 3348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3348 4508 iexplore.exe 82 PID 4508 wrote to memory of 3348 4508 iexplore.exe 82 PID 4508 wrote to memory of 3348 4508 iexplore.exe 82 PID 4848 wrote to memory of 2392 4848 chrome.exe 92 PID 4848 wrote to memory of 2392 4848 chrome.exe 92 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 5044 4848 chrome.exe 94 PID 4848 wrote to memory of 1912 4848 chrome.exe 95 PID 4848 wrote to memory of 1912 4848 chrome.exe 95 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96 PID 4848 wrote to memory of 632 4848 chrome.exe 96
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://click.alamode.com/?adcode=CPEMAQM0913_1&url=https%3A%2F%2Fvo7fw6.junkcarsquickcash.com%2F%3Fregister=YW1lcnJpY2tAYW50ZXJvcmVzb3VyY2VzLmNvbQ==1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4508 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c8629758,0x7ff9c8629768,0x7ff9c86297782⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:22⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3344 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5000 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5148 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5244 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2784 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3396 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3328 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4832 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5152 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3256 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5596 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5536 --field-trial-handle=1812,i,8060558375957742483,5336441091825558169,131072 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503B
MD5cb482430a184eb85d8f4364ccd48c1c1
SHA1a193e800e7f80ee164ce63330e8d54e50d864e49
SHA25698bc6343dbe14740a3c7fb4d49a96770217efb483ed1442e5d55c54bfdac16fe
SHA512776d5bfc7037022d11aa2a586dc1c40844a77ce4983933c6478a7b20146cb1a7d939492d0eb4ad275845132bee7026d8b04eb33da9c156086db588abf6325e76
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5931ac31f82e01c4a5ed27d29ed4ac208
SHA13c0e857f02516e94d3086ec277790e5c2c4bebf4
SHA25625f80b41222c619107eebc45f57f927f46cdd4fc8370183857e6893015437a60
SHA512a21065c11a9054ae76793859dad589aff47cb98ed0557bdb334ef1c216038635c3b5841406a21969af77775334e316989f29195beb415f7fdd409f53b6589ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\06408A7309A358E6BE5923EC0D109D5F
Filesize548B
MD543483d97b7b46af721f1ea3865c3847c
SHA1580ad59774635260cc31627d20fe9897f12a5925
SHA25676dd0c1c2dedaf182786d19f999ad1ac1d500f6e2228c7d8344b25c573c29e23
SHA5128f0dbbfa2941fe090471a0c4d12d2ae33b0860668499e2b1a885e5ab51de1e063be57c748bf174c938e87db24f9fa9c5950947c7881b2751370f3f18c7b76379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5dacdf08c5ab80a28ece2baaaa0dacb98
SHA1284e19dd31e4e99ed48cca16b3ac4ce7f76cf27a
SHA2566ec5f75fc10f66d1b64f4b573ba2fc0f5dd3c8559f1884f6e4d3e19b3b0cf4fd
SHA51220a5e0b20cccffe7e85cec4c41409564256affbef2227b702c573548593080a2e0c0837c077ed0b4afc128cf0219c93e4cd068110e7a1741264959f95f945966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD502553d9b8ceef0f5e5fef8afce15649d
SHA164e0f89e00147893a27955a235906dfa8c70dc96
SHA2565ac326b4307ac89c8f21461201157e80ee9dd3c57ace87551a84ecf6ee7d57b2
SHA512d5866409c9678d0c5b0cc85a04c8638ec295f3f4b4cadcc497b8b2487ebd2479b68df319f6ddb607576e9e0afe2dc4f439ce1eec4b169a300571a00d49b03f04
-
Filesize
144B
MD559fb5b884658774f516d26c009a2f740
SHA188f4674b6e641bb083004b36a588c9ed0affb8ed
SHA256eb878962b30c15a1a87c09b395758a805c971268b133025ab47aaacaa7b00db7
SHA512437ae6a3dec9dfd4468c2db2c342cb86fb0e863a171f268149c9d58567c23d4822b05e0251797d8f4fab0d1cc1f83e967438694e2a60386a19907a627aa6f8aa
-
Filesize
360B
MD53bbaa19da8dde5b17754e03e48621f6b
SHA17a904ef239d675cb1a139214519f27a6e6aa56ad
SHA256d4ee2a67e4b2324010952e510cf50406eb1a71d4918e28a20d3c252f03f42368
SHA512ebb4d232f2f4cc710171739d7a4b07d35158b3bdb537227d65e5fc0421f02b3e730225f4653159ef96697e63cebc70faa17c67f5685356a8f60609451ffef030
-
Filesize
3KB
MD5c5778851cea6c66386e3760d22b9beba
SHA18acaf9b135bc33b490cb747c46ee7e7ceb62d9e5
SHA256be7c5236eac3f2635a6ceaf4f1468a5a0e82730cbf7b463fa59ae9ad25d88c0b
SHA512cfd506d99fbff8212a1ede521d047ec53d0ce3c98f9582be1a3514cab252dbe90cd1e870942ebcbbed4dad8ed8859b907697ba0ceb61a020137f9c55c7c9784b
-
Filesize
3KB
MD528d4db648f529cfd37b654da64ea49ff
SHA18fc4ee9ddc20e2fc3d90d00d6d55fc40cc2d6a50
SHA2568926430d667e27db828d6367c4fe1c9c522d2da8ab144d0ec282a71dae9721c0
SHA5123f61c258dd1dad80ad5eed3fecee89ed988312db89ba361293369f1858fd4c40a99bb0cd820859a59dd76bf8e6720672f10f5b657c0ec00819f1ca8c0162f114
-
Filesize
1KB
MD532500c1831e3b7aee7be9c24ef3ca9e9
SHA1b08929fbb43ab5b5971322a76bbb6eb15fd431b3
SHA256eb680b381aa1b9debf11e84df8c0e5a8584693c77ac038dd8554b57c1e6006ad
SHA512094f92e906be4e95a4cc5dd9cd3e8567879f22779d27a59592f087a0746da97ddb0c111ca526464867aa775c30eb2b49737364544aa9d0661bbd703c8b4d858a
-
Filesize
539B
MD5f81342884766bd1b0dbcbb1b8d54e155
SHA17e9a517e8f00faa2ad82e4c83dd191f2285298b3
SHA2560c887b95391235920f3214fa6d114bb81be587345ba1a7976c3dc337012fa1c4
SHA512bc3d5b7424f7760c84bfcac2914c11be3f79cbb955ffcb1694667a4441e33211744457d5e85a439ed5cc275e1d0c3bb297778d841b1f74b4192bb6e4be8eae42
-
Filesize
706B
MD5a03207d9251c28a903bfcb043ddd0aea
SHA11fbeda2d80c2c26f93f19cf140fa4a3538c69c3e
SHA25602e697c9853c67a812ee8b3f974328fecae1bd57153caa84f2c882fb71c6704a
SHA512e6e76796644d56c9fb78ceb2f548a81212ae9863340d6b911e751562de2006dbfb728248cbb949dd2930126eed9d788518bc4ad59326a34eed3ebd1abff3b2fd
-
Filesize
706B
MD5859801bd3da89423b1c1ec17551109bf
SHA1701f1fc1eae9fad6a481e0f44de58082def25188
SHA25695a9aa079996d3a28f79371d017189198d05a40db0a4cc32188686e06ae0fdae
SHA512552580f4562ff69d4fabda21d40a140e9e22aa5b68ff8be8889d87ca0f315f6e3410fdff9ca6f9130196d8120e00950847447916aa36947a535adab82c478f73
-
Filesize
6KB
MD54ec517f86490ba94f6cd28600073fa79
SHA10f30051af7d1feed095156aebdf65a0ff0d0f9ce
SHA25630debd086f5d25ca74bb28a2075afe15086a7be582303cd273ae715472f86fdd
SHA5128bb113188dc931f3e8ff361b9bcddc015bf4533a4e77344a4ee4bd8feccedf7699e1b8e385ab75f89e468231be5ab11df1ad5d6bc7c18be5cde1389aab52ced3
-
Filesize
6KB
MD51485e9fe1cf4eabed2b1582c5d50b80e
SHA18d5981bfaeda2f99bda6f62ae0bbd5745af41285
SHA256c33c0a47716f65a735c7666d1a164fdc09c8f0b2fcc776d391f022b3359a8431
SHA512691f5e342591a21af4e401d8a7198ede5ac3b29eb0c818aa8b19606677b26c8fbda2752dec5a0ff7949d78710f35adb81b103125d9b0b91c72d25b3e8e93643f
-
Filesize
9KB
MD567e05b9de46bec895d4368a7e15a4316
SHA1723d601eaae12a5ea4c2e98cd3f297a8ce11541e
SHA256c6e143df54050ba114445a4e5f8a1b35592a9d6deb3b7caa6a85f37702167325
SHA512bb3b91c7714917cbb9b1cc8cdea324826745dba534373a13a1237cc77208f42b4c72077c700984fd4dae3dd195c54d76043bf52602bf8fd002f384d63e37d96b
-
Filesize
6KB
MD5bbe435d96e31da176550e411dd73b232
SHA1d46f7a97d3d7c981ba185300674115f5c07300d1
SHA256d1db084a34026a8eaae0dc15d604a804c8c2573841de698f93cc696737ae56cb
SHA512d777c9d8315e542e53db293dfb1dc18797f52713e18f47d142e7d55d6c3f938966c11e4dad18aaf7af7fbf3001d135a349e8fd5f09223cc0f8c36b1ffb4c578c
-
Filesize
15KB
MD5b8549599b4342b0a7a3eefde8f080f97
SHA15a072dd68d5ea63ca086fa67f1fe5f97b4f48dd5
SHA25635be609e2cd9defbce30ea3035de2a7e709e7a6ce8984064da767e4b4f12df95
SHA512877be6129fe2856421f6cd2573da9cd61a79eef88e8ccdb0cc8db41775b71083ad6b912549c8432bdaafb1459ec9d3261741d792fa053c2c82fc3c42a1af9cb7
-
Filesize
151KB
MD50b557f045af3cf02efd871478103c414
SHA14cff73eaa2fc6a6069335670b1743d85e04faffa
SHA2568489cc9d7505114d9a9ac1e4e388e1cd1b70ff745279c14e3c9d145365646b85
SHA512ad3ae660e0824a1e5a775d0d6fdb516a2f755130969cc193e1529ef66a53a9535330bb3dd16f50c1fb4c5d2a3129430d126fdd07cc2979dae5e2d16e1e8a98bc
-
Filesize
103KB
MD5cc6de3355b1e62cdb708b7eda66e92b9
SHA1418954aa33dc36446660c3df2fcd6aa7efc341bf
SHA25605f2072a91c098f44e20cbab1566cba1c59563f58b999d43ede295bd315d049d
SHA512b9c82820f8af7a9418d68a15625a3ff7b8ab2a7e6de525ef8217bb614082bfcc0edec25c46d5f097e25a663ef9fb49cff29f4d4cf921789c8f60273110413349
-
Filesize
96KB
MD5058024969215911df4e6e3934f3b90d6
SHA1a5a07efddbdc7473495de4479a3450a354412bd8
SHA25663b21b14ba3fc64347796d75aad8e861cecf08cc90beacc9e332aa8472322483
SHA512588dee9538880b2fdef006bfde2738908e3ba5eb175ca72e2eb3b38c4dfd3f60744dff7abb167f593d143fcb83f6a944ca705a0b6124f0047078bf2b251814b9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee