Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1200s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 11:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001GBTVFdGzW_kMscoBTAK5PW5y17RilC1RpwyNZ6dzzCz9iOvk1FIh2omdFlpYX6cFod46CfFBwmmCzn2Bl8N0L0yZqdRcYgVg8G6othi9BWmpxQY4Khu94fTROeHMUJO7RaNFe8_gFuaKHy6EZdR1k9fS8Ais65nLeyo4LkpnyPk=&c=t6qnLhxqEVQvw-xmuOnenfh9sL2Hm27BKIAQXojoYjXSa05g3mNirg==&ch=b5df2HXdw6jiyNnNfuqdLIFkJjFbcdn_D6doyxm14l_xYP0CFBTAjg==&__=?DOgMV=dG1jZ3JvdWFyeUBub3J0aHZpZXcuY29t
Resource
win10v2004-20231020-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001GBTVFdGzW_kMscoBTAK5PW5y17RilC1RpwyNZ6dzzCz9iOvk1FIh2omdFlpYX6cFod46CfFBwmmCzn2Bl8N0L0yZqdRcYgVg8G6othi9BWmpxQY4Khu94fTROeHMUJO7RaNFe8_gFuaKHy6EZdR1k9fS8Ais65nLeyo4LkpnyPk=&c=t6qnLhxqEVQvw-xmuOnenfh9sL2Hm27BKIAQXojoYjXSa05g3mNirg==&ch=b5df2HXdw6jiyNnNfuqdLIFkJjFbcdn_D6doyxm14l_xYP0CFBTAjg==&__=?DOgMV=dG1jZ3JvdWFyeUBub3J0aHZpZXcuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434844475067340" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 6136 chrome.exe 6136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 5092 4824 chrome.exe 43 PID 4824 wrote to memory of 5092 4824 chrome.exe 43 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1612 4824 chrome.exe 88 PID 4824 wrote to memory of 1320 4824 chrome.exe 89 PID 4824 wrote to memory of 1320 4824 chrome.exe 89 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90 PID 4824 wrote to memory of 4024 4824 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001GBTVFdGzW_kMscoBTAK5PW5y17RilC1RpwyNZ6dzzCz9iOvk1FIh2omdFlpYX6cFod46CfFBwmmCzn2Bl8N0L0yZqdRcYgVg8G6othi9BWmpxQY4Khu94fTROeHMUJO7RaNFe8_gFuaKHy6EZdR1k9fS8Ais65nLeyo4LkpnyPk=&c=t6qnLhxqEVQvw-xmuOnenfh9sL2Hm27BKIAQXojoYjXSa05g3mNirg==&ch=b5df2HXdw6jiyNnNfuqdLIFkJjFbcdn_D6doyxm14l_xYP0CFBTAjg==&__=?DOgMV=dG1jZ3JvdWFyeUBub3J0aHZpZXcuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9d5e9758,0x7ffe9d5e9768,0x7ffe9d5e97782⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:22⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4964 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5044 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5104 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3316 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3324 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5664 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5968 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6112 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5964 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=6256 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:5828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5640 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3324 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4720 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5156 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:82⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6372 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=3060 --field-trial-handle=1900,i,1890670565368779870,12061235835856230125,131072 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5990324ce59f0281c7b36fb9889e8887f
SHA135abc926cbea649385d104b1fd2963055454bf27
SHA25667bcedd3040fc55d968bbe21df05c02b731181541aff4ae72b9205300a4a3ecc
SHA51231e83da1ac217d25be6e7f35a041881b926f731fff69db6f144e4fe99b696a31f9ab7766ca22cf5a482743c2a2d00a699ca2c2d67837a86c471a2dd3bed9ea1f
-
Filesize
1KB
MD5634a8a34c01e37f440b01421d947fab3
SHA1ab560da9e979eed7a1887d6f7b2b6456b8f791a7
SHA2562b6ed100a26f2f7a0097e921a933035e3d392562aa5dfbd754ec2963955b8799
SHA5126bca88fdac475630ce152988376a7465bb1c4298b4aff27d75e16020b4fab47264b02d4a9b251e200977f615deea743cf7d7dc7737547eb9d4619051d05ac199
-
Filesize
1KB
MD55e4320a2a12ad916cd4032d4b509c422
SHA10832f97546f3fc596a0559649130188ec92d2984
SHA2566323c180fb637c5d4015a9154f280583843b5fbd00ae9bceff6380686ffbeac0
SHA512d857cbde9c5903c518d6a4e535d0439d3e2bff050efe6947afeb9fcc5ccee90893e480ad2d4562e8cea566cdcd5948afe5bf6df5d24a764c0d427057b700f00e
-
Filesize
120B
MD5b7fb282d2fe201e9fedf1e3e47f24fd3
SHA1a3842f55646180b21950ac8463a6abbb2e86870c
SHA256deb76c36fa4fb11a63e5ad4a0a4a370ae6b56dde95f5c827c913be8df97a4460
SHA512c5a46f448260a470fa2cf27db360cb2ab1686fc75a038f100f50a2ce892be66185087065e8e7911228b41b80010e44f2241bb5f0eb256d20d31a39f8b9625d57
-
Filesize
96B
MD5ee52222dc376b404fba42547b4214e3b
SHA17acce248b0c09862d08edc775ee3a957fb776324
SHA2561396e4f2058372ae80b7593c3b0a9821d803fd75e3e776a8dab72b9112dff6a9
SHA5126ff0fde8a8d78618543e858c0782b45de3ea84ca367996da2811bd4df9688298721630d8d2a9c908094fc85ee293bc2f31048f70cbb9b64334aa2aabecb229a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.office.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.office.com_0.indexeddb.leveldb\LOG.old
Filesize347B
MD57ec68e6726ec8ee18a1bf68580c2792d
SHA16ecd5e65c6551b6f3619ada2b5b32f0d9225f510
SHA2563b69c2508d4ef37d1e58990bee0cb46820a3278db85dc13ba786c842083029cb
SHA5127214c7b970a37ad522db868a4da9c94b2e6d7d46039fce9967c4561564ca41969059fc68b9bcb299ac08cd91a9743713c1b999b2726f4e9bb185138c8c4a914d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.office.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
3KB
MD56f3b64addab63372f33774079b451fa4
SHA1bd5b0e671743eac50bdbf910aaac315b75795789
SHA2561ff39bc46a37ea9cc79255ec64ee2d5561a177df1f618123b06217983f446659
SHA51270f799832404b0b68fa8c8852735282f90ff241af148ededbacfbb101bcd8c372ce3edaa9df7580feda0506bc7b25d8f907c9a1288edd960dce88a7bbb2747f3
-
Filesize
5KB
MD50b95d4bd0ca5d1759c423634dd55eb9f
SHA1cca128603af35b953311033ebd0433f30ac0b296
SHA2569f1a5fcd0a16baacda57a2ebcf39d4bc9535e614b9d58f75ddc27cde6b2ea28e
SHA5129add0fbd7b2021dbecccc75c9874aec01edaf2578a1acb21a496bba981c7be4771ebbdd86f677ac8fc44c3a31b31026577230d8087a9bafdf8d5d1842389ceb3
-
Filesize
4KB
MD533c89f4ca2cd3559a62dddb1b96d2cf5
SHA14f192e1b87f204d940ac8ac954d000cdd6351652
SHA2568b978480ad12026981403c6f642328a6bf2c610664b150cbe79ebd8b51a37073
SHA512854ebefe6f2d7bf8d8b3a4d1dcd5f4d1244a20ea9fbe18b8455819c24fa1f43ab35470c8c76c5935f79647bbd9ac821cfa511150d99e427ff36606ca1128163a
-
Filesize
5KB
MD5beddf2440b4ca8af152550b92ae661a6
SHA1905dc694aa44a019a6298488484acb9bd21848dc
SHA256c3034bfb9e37d8c776bad2b0fc8b00d5ddb6b9b58ee5836502be80df41a395cc
SHA512d9e56d6bb09f539107d1aa8a8ac1e4b87fc0eb539518d6a8a0e26832ba186ea0759b46191314c1eedbf585372a3447fcf70a83e2a6d5eb8722067a004a1273cb
-
Filesize
537B
MD5c767bcd68f6e87ea11769d247233d6c7
SHA14acc918c70b1032d5966771eb469bb2d36e7c35a
SHA256f2dadc83e6a23485b18c98f3dd5ddda9cb3ffb5f3019ea7e447f3bfd206c4605
SHA512600df31cb9df32cd1a665a5b7e0c5e9252048a430f2f25cd30f5da245af3a406efb841ba9ef0510159642a3c98e0d00b7beec9baac94ccefe224c77d98f46922
-
Filesize
1KB
MD5a15519fcc78b6e1aa9fc3c6faf38d27a
SHA1f9a67b42785cfdb7ee7f12bf0001e9fabd8d5a21
SHA25631f591b22414b3d5be914665d824910c351e2049d18e7065610c267801a16550
SHA5126f2e24c84983c9f9f1ce9c344d2d92c22ac485a84fb27c5222463e63d7a5e44fcaa37b90c22640d1b63e9668dd33a6c998db100755df472e9f6199977b085529
-
Filesize
1KB
MD57e5650c525021d569d4e6af8e6d68f7c
SHA1d9240ae02c89d2c2dfae3bb0779170f7082efc8d
SHA25651f128b4eefc432ea940c5a7f74dac31211ef8ae259c2dc948dde0456132ee35
SHA512125d711ea669df2fc07152f68f0e216aa348b9392aab51dd134b325df1ea8fb81be14e4abdeacc900a3a91170ac169857dd25905f15a9e1338880b441734d553
-
Filesize
1KB
MD5eeb59546e2526d8c0787276c5a75edbd
SHA17fb5138192e3c513ac302a90048a3fe3d33e346b
SHA256f921d9329c4b4498ee81b1eeadca099c3d75b12066da6ee38a889c5a51d23ac2
SHA5129e918d2fefb058beedad662376b1abb58800bd4b2cf67d526aedecae0c28547cfd40727e9b1c8c0aa8216f3d07e59b70dcd251ec8b5afa06dc07282eca5b0e07
-
Filesize
1KB
MD56cfba3c628acd8aff4a8da672efcce75
SHA1fae45206ba2874e343a2c1c20b3377b49c422cab
SHA25669110e7d803817992fdff40c2dbc171cd6a94fedded9f9d41e34a73813a2952e
SHA512b778c29a373c05ccceed734e3a2f4be6bd7d4fe442e2f9e23b56152c9890dc9b1c8ead9420ababa66a1d5bb0d539c00e24bf8ae84f4cf2d4a7b7101d0cdbf8ee
-
Filesize
704B
MD50c99e8c754d954e8a79fa1ba9c56b760
SHA17624b6f7a63d9d0833597ef6473611ea7bfacf6d
SHA256c992cdaafb53cfcd8b5b1b6d7f1b8c28f7dd4426316e5d17398551caecb9dac2
SHA5128364a2841192483c18064d3b0cccd6495bd619d5535240bc9ae82c8a446867fdef4b01dce96578bb3e9d3d4b982f5e81134592388342b56fac49603770f973bc
-
Filesize
7KB
MD5b5414cc19c1baa690c699efb536f28b4
SHA14649bc0e123d6f045a44e5e8b75cd90881e3a6cb
SHA256fa89837d502c205b9ee154b342d8b7353c07acdc6ff22d994fb3850319cc52b9
SHA512f28cf532d49897927e686fd50099b6eb845ceb2533d621732ecf53c925821b3528c99444c07e9522dd169f6def2467802b03495662d33cdc896547d2d5ef8f88
-
Filesize
8KB
MD5fffed6434f8c867ecad45d1c29202fee
SHA12f8944d363815cd5eccb8afad0e5e86c53a91ea9
SHA25650621bce350dae90f374f408b5f932c99f44d3cc1ef4bea7c9ec8f4aaa743043
SHA512ffc94557d96484c8fadb73f001462e34dbe3117beddcc349a043766b593f4a7b4247842f9d7fdb8dd711b952a23b7d2a38950b6906aa0a75d6673332d96e14e3
-
Filesize
8KB
MD5e2003425319bb35b85c45414b7ef60b5
SHA12a6df192ad31fdbb59385d329500cabc5e3c56af
SHA256fb2090119742cb24cb66335e76e9a3db6a888b581176cb29794364e453acbf71
SHA512cc4e4185a648a3770f865e031cce047787df15fc6c2ec39b6152b79a869227491669f65340acedb8e6e99e4852434c5dcb1691e159acbc31ac65f8312cb36241
-
Filesize
6KB
MD512ac077f7d6e4e088aeb18247651b311
SHA1b4511f377352ba454e2ec88f7baa916671f3402e
SHA256e8bfcfd3ce227c1dd52b50778ad1ac56623ca24286e684b00a9f66216991f005
SHA51284488bd03bad1395c2d5e60d7347feaf901ac8f20babe8a749d90779720d3eef276be159ee6108438e2303637aeecd2699b5f76ab887201934ba31792f073452
-
Filesize
6KB
MD53f9d945270559902a8cd411e91a67d3a
SHA13f3ada171ea4c1f8886901474ac0cd49311bda9b
SHA256989cd1c1f7f26b6b26457b7c91667cc38ddcd83ba6d50f27522a5dea62ca63af
SHA512b8943b19ae21ce8ec27d47983646495751eb3373aeb23105a8a519b80b6c6a20dfc9eae0cbf94b7bf0edc4c85f4a5b64c9154e223ca4aa94cf8b6042c1a0f64b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\29eb5eacb05363703a494bbad16a2cdd1da1fb81\ccff4a47-78fc-4213-b4ee-3d8e2d3ab7cf\index-dir\the-real-index
Filesize21KB
MD58c6db87ac7417f891baf41ae4e9d2c7c
SHA1159987f65708606a646843605d8407fa4af405ad
SHA2565c041b14b614a408505ee91f05dbb53200eba405e765d0b0f7675cb91f763648
SHA5120b7f379fe922dc8baa0d627726a96494beb55413e54d328d35bada8e8ab300ffa8326bd4fd6c5a7c8aa8e9cb82caddd972f47b33f85cde9204fd7c40a4c1e91a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\29eb5eacb05363703a494bbad16a2cdd1da1fb81\ccff4a47-78fc-4213-b4ee-3d8e2d3ab7cf\index-dir\the-real-index~RFe5c00d2.TMP
Filesize48B
MD53cf32605442cc601472bf7033b74167d
SHA13002e66f7bc0f0604b83bff9ea19e4fda2f189dc
SHA2568d18a393480e51101422e87488ecbb9abb2478d307d9b8a69af1415750d841d2
SHA512dc6f8a75436ea7e53ad1417974589fa86e952e2b54753a885a271983084794d9971ce74bbced1a9d3bb4ce800fde0059d9eec1ec6b0edfb7ba36af5d9758481b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\29eb5eacb05363703a494bbad16a2cdd1da1fb81\index.txt
Filesize260B
MD503253dabfff22a9a1a44924425080605
SHA19363c37f316f988ef01cc17d6fac501a98d60922
SHA256c5fbaff4603a80e7368fd07466344017c41ea66c14a82f32583070db0d0f5b71
SHA51274e83f37d2505ec6413b36f8dbb4461fcd43a74982cd3e4de2988bce1a1aae9eccef2eab567754a662f93a572d603d11c1fb65b8bc34fede5f47079facf32985
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\29eb5eacb05363703a494bbad16a2cdd1da1fb81\index.txt~RFe5c00f2.TMP
Filesize264B
MD5eb0677884b4b9abdf6f2d8003b25e64f
SHA196b449323b3d22ad10aec99a92964abd046b058e
SHA256c1e307d8fc52c47c423f9c0c4b89b1432034dfdaddf00eb92509d9a69a50616e
SHA51215f3d6aad46fe6380bc764ffe729d7daf32bfa64f5a12a3086470363372a94c67f3a91f29b113fb5c5d6fe487fe4c81a586d69709430c54396d456d9ae5474cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c9dd362964b8bc141440b339d8bc528c
SHA1a8a4c6440ddd716d71416c04fdb76f3c7499d085
SHA2564417751a186e9ccb6a921011a948b1b8ffd29603d5250289f59a56df78e67eca
SHA512f0723fa2e5df453fca53a83562ea3895ba475d4f82740b43391022e0464d5a9cfc61f9ee9d99779af31813b5ea66ce3f107b3bff7bd00a4f9916d5d981630da7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize264B
MD5e835b8a8efe54c8bf0e0dd2a63de98d2
SHA1e59a831c754e70f5e8d445b9083bf96606633cd0
SHA2563e51b16f10c5ea2bafbf4ef5ad0d885bfafb529fcb541fe52cb51034a72c07b5
SHA5122b10f2e404bf18cfd02b01f5a3998e44b6fc98926ad348dc7e52c0fe071a151dad24cbda6280ba725f193545dfa0fc7c43ee8abdfc58140970ef24bb95e1c1d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58d210.TMP
Filesize48B
MD514c29bab6827ade5161438f3dc17d61b
SHA1df700683260242545feb0cb37eeb554c9fbe1836
SHA2565f5ccf24f7e74cf90a68ad2b8519a3f7765033a3607ec535a3fd4d4caffd1321
SHA512f69113c184bc25bf66ce7677f9b181c1c7ace05f22846a5e248131ed2ad1d3e16e7693c6101580bf6001c153af6ec0474c8a68365b7c6ab121454e833c61ad5c
-
Filesize
109KB
MD5d8d420a44c292dcbc8539cdd86d5d6dd
SHA123c9935d263c212e2ae5f896452b52876e27ffd5
SHA256deb7bb43139a98e26974a39cfdfc9483a977f81474d790562311c4e0b6ddf191
SHA5124a925d6623e872db724ede7486c10ba881048fd61526562ff43e9bbfbbde7cbdbb6c1d5097f0bd658b34220c636bf9ad948b911c6db15d1eeaab4b7b4e4448a2
-
Filesize
109KB
MD5433a95b65a7a62fe817371f850c75626
SHA1eb75efe98e08454e2db6676f5d3ddd527681f64b
SHA2565c53f3d139e89a50dbb6c66b6b18413a981108c6855116261c3b35b1c0fe00ee
SHA512a80edf84e721ce758d4328258828d42f7b1606e8a57f5f73f279d5dc8dd62d7930ecf2a00111841a1536013b2cf5407868f9eb78f3dc4dc1849cdd90fb76c09b
-
Filesize
109KB
MD5342d892259ea0b7e69c73af49a1334e6
SHA1fad97d8f50090582b0f2eab47c9d8465cb6bc975
SHA256d8319aaea2e462bcdccf5719cc3f05a1d86aa20204a717bc3df6150f15dcbd09
SHA5127db937140ea238b8e0eba2517ef81a09cae6ac224f475350babbd74786c8faa07500fc351081eea9c61830899b0d218079edc47dee77d3e649c1b265d8bf70eb
-
Filesize
105KB
MD5368dbd56f86b0051347e9fe0c05b3c06
SHA14760a3afb121bb80da900dfc9ddc84b196c370ee
SHA256b28a0286c660bc19a30adbead2de77da606d889e717f17385a2e0ecf609fd8b3
SHA5127a42e5d44efe000d09db145863f9380f3c21a5ecf496c06ecaed0562a5277e573d8de2d7044c4f7b6d0e55477938b23df153e05fa359eb94251d34ebfc761947
-
Filesize
104KB
MD5bd63cb063b692ee8646b16a769279153
SHA1790fc50a759bfa1eee111435f77ef1c5b6b677c3
SHA2567d8234c6ff833f5af3e03495f25dc2ece513baa64686a001571410cea6c41aa2
SHA51244b1acacaa1f791fa7dd9564443242ed0453c931223da3809835ccb2498f55709c7b4195743a4a42eb7b4fcb61cce9c2be495e98654bc5d143b3f7a409abacc0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84