Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
complete Amex-express-security information.html
Resource
win10v2004-20230831-en
General
-
Target
complete Amex-express-security information.html
-
Size
704KB
-
MD5
7dde64f3fce92b7157c4f5fbe6a01a58
-
SHA1
cf92cbcdb87d562673e2e93864e9eb88da9913f2
-
SHA256
94c9f198e46ed81408d922bb16391dbeb556e29dca44032de578fab1f090016f
-
SHA512
7abed22b2e33913fb9b7dbbc03f0be914dd4bae61aef2272d7cd41b79e02b836d8b459cf23ee4084d38955fcae390c94a41c287d249edf772248bf1c03afa452
-
SSDEEP
6144:NwMxRkWj559/FmDMrJenb2DMrJtnPM+2DMrJQnN2DMrJ3nJ2DMrJL:aML1EDMr22DMrB2DMrW2DMrP2DMr1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382863495239583" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382863495239583" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 960 chrome.exe 960 chrome.exe 4044 chrome.exe 4044 chrome.exe 960 chrome.exe 960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3528 4044 chrome.exe 86 PID 4044 wrote to memory of 3528 4044 chrome.exe 86 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 1640 4044 chrome.exe 89 PID 4044 wrote to memory of 3232 4044 chrome.exe 90 PID 4044 wrote to memory of 3232 4044 chrome.exe 90 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91 PID 4044 wrote to memory of 4276 4044 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\complete Amex-express-security information.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe34cf9758,0x7ffe34cf9768,0x7ffe34cf97782⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:22⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3908 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5104 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\complete Amex-express-security information.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe34cf9758,0x7ffe34cf9768,0x7ffe34cf97782⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:22⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3908 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5104 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 --field-trial-handle=1892,i,4307212225985211596,7027438658078534765,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f259bdb7e132c8554a3949fa38493f37
SHA12af922d1e7389055971a206e271355ec38374e7a
SHA256f58e1bd5f31671ff3391c77a5f36f3dfe1fcd856ebf2f6d4025e02a024087352
SHA512401835e6c6ca016faaa51729a6e36d4730c3ea5b60e1e0fc85b0b3ed8ce5bf1ea0548f2ee98da6bfca72f243c5ac63f6271ca2d240429b36c3fa722c6ef8ab1a
-
Filesize
3KB
MD5f259bdb7e132c8554a3949fa38493f37
SHA12af922d1e7389055971a206e271355ec38374e7a
SHA256f58e1bd5f31671ff3391c77a5f36f3dfe1fcd856ebf2f6d4025e02a024087352
SHA512401835e6c6ca016faaa51729a6e36d4730c3ea5b60e1e0fc85b0b3ed8ce5bf1ea0548f2ee98da6bfca72f243c5ac63f6271ca2d240429b36c3fa722c6ef8ab1a
-
Filesize
1KB
MD532a5dc3c06b82b94518627ade9922d3b
SHA125d37025cb744d06cf159875d617392b756562a1
SHA25685e87c36d9342eb5c3bd2db1ec042f4a4b4c2674bc164483784464aa337b465b
SHA51257756a120cbd520cc0426138480de40580d3ad2847013b10913b87f571867b42622c588b191e0c626fafdf1c3c2128b71f9747540a46f12f9448b652d1b27097
-
Filesize
1KB
MD532a5dc3c06b82b94518627ade9922d3b
SHA125d37025cb744d06cf159875d617392b756562a1
SHA25685e87c36d9342eb5c3bd2db1ec042f4a4b4c2674bc164483784464aa337b465b
SHA51257756a120cbd520cc0426138480de40580d3ad2847013b10913b87f571867b42622c588b191e0c626fafdf1c3c2128b71f9747540a46f12f9448b652d1b27097
-
Filesize
8KB
MD58485c13e063eeff81677250a2b2fd027
SHA1e996c4f512532402d6628b5a6e61a744565d9073
SHA2564bc845a1472453c201334597bd42fd06ba609a63d010e8f052d205eba6eb6eb6
SHA51255d8c45fa4048b6a241d0472e1a6e92820a039b3debceaab54e546ff32464fb4ee9241bc247697cef7d6d33ff6d042ee3ddb70509c28ed91a1232d152cd64314
-
Filesize
8KB
MD58485c13e063eeff81677250a2b2fd027
SHA1e996c4f512532402d6628b5a6e61a744565d9073
SHA2564bc845a1472453c201334597bd42fd06ba609a63d010e8f052d205eba6eb6eb6
SHA51255d8c45fa4048b6a241d0472e1a6e92820a039b3debceaab54e546ff32464fb4ee9241bc247697cef7d6d33ff6d042ee3ddb70509c28ed91a1232d152cd64314
-
Filesize
8KB
MD5e1de2878688656efb8c786ab8307e0c2
SHA18b1302fe0e557f3c79c7e5dc3768cea5166fd3b7
SHA256639d92c7c8c207f39c3a302304060e8c042624d1e1439e094806d85711aa1e38
SHA5128a3da7f6e7d0f93b1033a63f2ad08e6a87a8e6bc485c55c114e5575e086a612a02052bcca97f62e51baadc37d75ab22970efa5d40bb087bb5e3161ff46d4b291
-
Filesize
8KB
MD5e1de2878688656efb8c786ab8307e0c2
SHA18b1302fe0e557f3c79c7e5dc3768cea5166fd3b7
SHA256639d92c7c8c207f39c3a302304060e8c042624d1e1439e094806d85711aa1e38
SHA5128a3da7f6e7d0f93b1033a63f2ad08e6a87a8e6bc485c55c114e5575e086a612a02052bcca97f62e51baadc37d75ab22970efa5d40bb087bb5e3161ff46d4b291
-
Filesize
5KB
MD5dc501fc326427776964e215d188da415
SHA14c399cc7b2e6abcf33024106ac146ab5f6d867eb
SHA256b59c2e607534725e65110a0fb2a81b679732f7552346e9a7814fbf5e10a4e052
SHA512cedc9949890576a40d3f6f080a250d7dc1976bb0748f5df38f17bcb6ea31e7a008cc78bd8077f2869085be87e04393c6a7c0f483ac8293bdd61edfb9cbf17752
-
Filesize
5KB
MD5dc501fc326427776964e215d188da415
SHA14c399cc7b2e6abcf33024106ac146ab5f6d867eb
SHA256b59c2e607534725e65110a0fb2a81b679732f7552346e9a7814fbf5e10a4e052
SHA512cedc9949890576a40d3f6f080a250d7dc1976bb0748f5df38f17bcb6ea31e7a008cc78bd8077f2869085be87e04393c6a7c0f483ac8293bdd61edfb9cbf17752
-
Filesize
190KB
MD5092a3f258de2d692c1878b9198a73533
SHA174ec38d108ce51b1b54b07138b074eb743b793e6
SHA2564425f08d97c1f6f7fb2424b56cf2a87628b00cd6545630ddc25ea9104326b389
SHA5124b80ff41cfa187c97e228f1bfb1ec59ee3dfee6d90147414238169acfb21b93d49c7f5cc9bd52288c503d6260253c17a2d156264144539918f5f1c821faac22e
-
Filesize
190KB
MD5092a3f258de2d692c1878b9198a73533
SHA174ec38d108ce51b1b54b07138b074eb743b793e6
SHA2564425f08d97c1f6f7fb2424b56cf2a87628b00cd6545630ddc25ea9104326b389
SHA5124b80ff41cfa187c97e228f1bfb1ec59ee3dfee6d90147414238169acfb21b93d49c7f5cc9bd52288c503d6260253c17a2d156264144539918f5f1c821faac22e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd