Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
1.txt
Resource
win10v2004-20231215-en
General
-
Target
1.txt
-
Size
117B
-
MD5
2653acea778f72bb75c0a57870fe7507
-
SHA1
9ef9a26fcde7349e67954b6b2fe5efd53e95a0fe
-
SHA256
61649140ade239d199771c4aaeed55c6a31f2421c99c1e2ed1359969278bf712
-
SHA512
e30e7a260b4222d4ab9378b04a36a9ece5ef88bee34cd670a256ffa0643c1fcff1964d95fb79eb48f6c024c3f27d7281a8f76bc6fd2d8e6949a0aa8bc148217f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133484187589518845" chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3648 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3652 chrome.exe 3652 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 3328 3652 chrome.exe 100 PID 3652 wrote to memory of 3328 3652 chrome.exe 100 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 3872 3652 chrome.exe 101 PID 3652 wrote to memory of 4080 3652 chrome.exe 102 PID 3652 wrote to memory of 4080 3652 chrome.exe 102 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103 PID 3652 wrote to memory of 2076 3652 chrome.exe 103
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\1.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb69879758,0x7ffb69879768,0x7ffb698797782⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:22⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4156 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4280 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4448 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4308 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4164 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4228 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5580 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5740 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5720 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5836 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5772 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2692 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5400 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:82⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4520 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4080 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:5208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5640 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5188 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3276 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=1116 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7132 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=7084 --field-trial-handle=1868,i,14720005710710991463,14130675487305936631,131072 /prefetch:12⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54750f6d1a401f3f4eb4be9ea8e98711d
SHA1ac6fba28f8799dd4966acc45129b6d98d8a48d73
SHA2560e62902296ca5b5ddaa449b4a2e59f7aa7b8c65f0f3c196695410d44f7d6ea65
SHA512dd5b4130b349e08e17d590ce3b37ad41b7d6896d9d0b4c49661b54ace59f87d307074843a636b7ac492aaf4cefa7662254196d702329df122c2d461e7932fdc9
-
Filesize
371B
MD5d59ecfe6870d06ada3bac54c0ac8e73f
SHA14cb1eb4ea9736ffa79d887e67e1cffd05eed97dd
SHA25600a31ad19e361a93a8d6dae5bf35530d6e4f1afd266148726eb6eb5b89b15a25
SHA51237a262f0eb2c5e85792acaa66c8335999dd7ce85ed7a6d94fe3f0521cc74b91b4cb459363d68185f85348b5b32fe5f4a6fa4a11a09cad3608876a7641fb688ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\f092e8e9-82a7-4faf-bbf9-756b9bb28c54.tmp
Filesize371B
MD514d773373494fdd9536e7762d03495f7
SHA1c118acc31d2579823bf02cd5e600cf681ac058de
SHA25684dad95b349918be7c03d25677a7510f05602d88fc7e04c90fceb11f14c9df5d
SHA5120b2a577b13f0368590c5c9bfb64bc552855c60ba2d57b800787d43bd26576b3b620f33c8c1fb6e811dac881228945f8a1419609ff8ecc0456cc7a9000000b4f5
-
Filesize
6KB
MD5214d7ba4fbf738e6e6b5c1695c6cce57
SHA174d8dd2a4bfbb2547e9207c4305226cba83dd27e
SHA256a78a14346eb6fc63986cc462136fa335f68f651156b402815c47a33932c1c583
SHA51276943a8e64290ec9f35ea6beb23a65536cf5877a5e10e256de33fd466e603a19ecb0cb8ae4e61681beabccf892f2504a83b71821d9e0048345142ff2e3253486
-
Filesize
6KB
MD532b941a53a6a062bc36c00ece4c01619
SHA1bf25c419114ed13c09e7ffd61a6c6ee69cf97fcb
SHA2567247531f11aa507d547b8ec06e9df0683c3bd029d0587282316cc35edf29aa39
SHA51285fb8cd989f7280b0ca12dcc8255a14e5465b1634086d30733d7f8d3aa734e8450e0bbb7a0f694eb8008ad5411ddc7aff4bb3aaa0839f2eceebfc8b9e176fa5b
-
Filesize
6KB
MD525009f1d7cef84831dbb5d36d6cc885e
SHA197d016a445d4b7c29a0d10082b27fe50b17568b1
SHA256c5830029547aac6c4b70f061b3269cfe2211127153d64f3281e6752cad4afe7a
SHA512ebf29ce96d6544de39c5f2e4f10b1ac5f827afef1a535a80750d2c73816b3d73845acab361a6b611a59c36fccb760e460efb0da81559bdec80103782d6cd0a4a
-
Filesize
15KB
MD58310413dc86955ef24b25ba6661a5935
SHA1402cdc7988a3f26d5e0d70e547920cecd8eba003
SHA256b49e9e58b539b98b5fd7bf8b4dc3161fdd0593d8d8c289fb6db94c5c002a23b6
SHA512d7e0a177061de97bab5b25499780d8b72f169eb0773a59ef8fb872765886f169c1bd86a6710f0fe3dc583e4c6aeffb22648072b4175581899e72a558a2a6aa66
-
Filesize
224KB
MD5a1638b4d17f974bf151328499c8c101a
SHA1ba1f27445863102e14dbf786790ed20ef149b8f8
SHA25658650b104edbabada3b615d58564c2315962f8d6666e01e990747111526c48cf
SHA512e451b207a4a75071a161f281b9518ce2464a409cbf8b3d4132a65f3fb0e944b3bbff5686f50639aa4be97cf48debed97b127b54461deae1ac1cf5ace57591a98
-
Filesize
224KB
MD50a95f160c204e17e3743a4c61c0c5ba5
SHA1505408c49d198af8f1ddc14c7ce073e8862a48eb
SHA25630a54aac65314db8d298d02976c82dc866ab89fc94bbe862a1be7b5a0198f3c7
SHA512cf4354e258a4bb02ba05eaeac20a84d218f4ed9454c6ac8890e9261cd43269d96e6ceabf5d07195b16c5963f4a9e213ec5b985e410660011fcbd863bb5cb83bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd