Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 17:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~
Resource
win10v2004-20231215-en
General
-
Target
https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495544940341854" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4064 1096 chrome.exe 59 PID 1096 wrote to memory of 4064 1096 chrome.exe 59 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 1656 1096 chrome.exe 90 PID 1096 wrote to memory of 752 1096 chrome.exe 92 PID 1096 wrote to memory of 752 1096 chrome.exe 92 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91 PID 1096 wrote to memory of 4092 1096 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffcadde9758,0x7ffcadde9768,0x7ffcadde97782⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:22⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4772 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3132 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4776 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3952 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 --field-trial-handle=1916,i,121610958941341341,2865956283889493809,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5cf22f010ad063768de177794ff6c4c77
SHA155949d90aa5f92da8e23fa0137e0de419fb5dc38
SHA2561a45a7a6c82354a0f0ec5dd8654fde9b672ac6e207db537f925a12fcf194f028
SHA51217ea40c6c934ccc4ec6e9f785adfd92c24e72eb2f3b87e0107cf0931a8cec7675f85fcc97d7e4e4d881e5905f9fdab1346b7f0214f4d97b975e9d382f057cebc
-
Filesize
2KB
MD57dd000ab93ed90264e96c8c3f1c4fd15
SHA179482f9bd92b6b4511a5ecb02ad0a0e726dc4261
SHA256dd3b17c826b070484b734c009ff22df0a62946e27174eb362759ee38a6b05cba
SHA512dd3b942dfb714019a76726775294eeaf6b7bf98bc21fa25b14e38d58932678b610ea52e74298800c0e08ecc100b9135c0208aa34556d08ed53c076cfe98c77d2
-
Filesize
538B
MD544b0b33f74462c1313a584e436dc278d
SHA1d3b584bda6fc581e8fe90f543d0f692025fd272e
SHA25621ae80bfd77ea2d1985c4981e59b6c9acbca831aad8eba20cbf0482aa3e50db9
SHA512652e21b3fe69bc6c51b708f5d87d0728e9c69a54b67ec73b0b893b6806ee964f289fcbff62d9e9a5241768228fdfd52c01d4f0fb69848f6dce5eac319e0b2c2b
-
Filesize
6KB
MD5cfcf9cc7998a611c4dce8b3ef355ed2f
SHA115e77cb69599af7b31d8f66ce1a7347ac36f922d
SHA256a3bb0dc201f9f016866eec3e95b864125cd4031b3d2be1d1d618f3f75f228708
SHA51276d3d07cf8ea55e8da34de15bfcf4d76cb6b3688ef9c174b220035681e4db3c8c3afc9d5a88a4a1b04b920637651f80b94b9c352f37887bff4ea3bbb31405441
-
Filesize
6KB
MD5b22104dac63471bc624c1ae66df2140c
SHA119cd1fcf7e61050737e6b796902739c5f95768cd
SHA256cb4afa5ee68103124384822c58a75401257486a168a2581bdfc3ecee207d5c57
SHA512a0900c380f45128fac5cfa0e912feeeedcd33cba2459b1741363f84e4f80382250a6a9ae28acabd8bef5a310ca738c5585517c7251fe36847d4308badbc351be
-
Filesize
114KB
MD5f8860f833486dd9bdff8e4b6d5e7e1ac
SHA1b6e0f3fbdd7ec577da004b1aa0c7c6b1c3712645
SHA256027f4a255a3e4abb47b9b20daae2631097dcc98f74d470f246267cda4283cec2
SHA5127910bbd400b4730cfe4b83853bc561dc6ba00eaace9bb0cfc9a6c4598d0888a3579555f30a0ed62393a6fb459173b2694202da292b189b7b958b5f5b038c61b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd