Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
92s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2024, 04:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.247checkers.com/
Resource
win11-20240221-en
General
-
Target
https://www.247checkers.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532211081140541" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1760 4280 chrome.exe 77 PID 4280 wrote to memory of 1760 4280 chrome.exe 77 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 4312 4280 chrome.exe 79 PID 4280 wrote to memory of 2528 4280 chrome.exe 81 PID 4280 wrote to memory of 2528 4280 chrome.exe 81 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80 PID 4280 wrote to memory of 3048 4280 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.247checkers.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffce2ea9758,0x7ffce2ea9768,0x7ffce2ea97782⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:22⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4812 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3480 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3424 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5344 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5516 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5604 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5532 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=6024 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=6752 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=7044 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6792 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6608 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6188 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=6464 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5800 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6032 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5244 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6800 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:82⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=7904 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=7944 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=7964 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=6304 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=7924 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=7568 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=3744 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=8576 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:5784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=8676 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:5868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=8664 --field-trial-handle=1828,i,11677805623814583797,7103296018633893564,131072 /prefetch:12⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3820
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004DC1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD58a2f778b6155ae0ed02e7d1f1be01bec
SHA1043d5fd9f55c5c23c5e5715777ba3bc32a7f4f47
SHA2569fd2d904e7c3e7680153bc7368ad1e65fd167a06fdf8e9fdc2b211a828ae499e
SHA512e892a090d78818df624ebaba9a3e674053ed47df2d5280199ba5936dc8623ae064c3c1e59d56ae8055aeeb948bb6eb97280ea1fc846c9cf41f6ebd67b4c4f1dd
-
Filesize
61KB
MD51971e737391eabf87667012e84069a5a
SHA18fd29644afc6da70873c25f9bf9d1c495c759843
SHA256c9aab23276584648e971c3745fca3bed6d9e4c7e373bf3dc7ad316f2aef42fd3
SHA51223062a1d410b69532d3bf97ec7d1fa3c27e974613326fe3a3d80f909d595bda78f2ba366bcd612e494ecee1af1493264d0044a26fae604466e5437a25da6280b
-
Filesize
268B
MD5508a8553c2bc8fdf22cc0d0240f0dc69
SHA1857e61864862c4d37cdd9e016b26797a7fd3809a
SHA2564ad0ca609b71b797e826e4555a98b56cf16af6997aebf25b6f5b015de724f084
SHA512e1a70404754476fc24c825a52fd16b581b2cb1a404b1311d46727cbbbeaa5934ee011653f2a18ab13dbd666f07e06b3ebe59dd9fbe35a3815ec228f020d9b108
-
Filesize
72B
MD51265c5ac34f417efa00385fd7c92baed
SHA149494caa79046db52d23713f22333d65b307086d
SHA25674cf85b0658ea921fc08c5638144b4117fc618fd9e9ca509d10447ea304f04eb
SHA512e75c125c6c50e86e50010aedeebc3bf15f2d20c4295e919e15836f8bb7f861a2c5895e517dfa91dff827f326bb00404cf9d0d63d599688e1d1a2403305ef692a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
12KB
MD58fbd3a977f1eeea3f698a8e49e0cde39
SHA16816b3a9ead451e30bd61f191e7c7aea240b7b8a
SHA2560a7cce993a953f7fb5675df774439945cad86d1c56df73297883f0b5f0279890
SHA5124cdb83b5bb1fd717b7fc8ceba93b4b00be80fa502b15d946d9a9075c0213566aad2f31a4fc87d46f9a1f174e52403ddcb8dd59ff1489f5116ebf8cf6bef0cd33
-
Filesize
5KB
MD5971ff20d8b0aab7ea310207621d5dfc3
SHA1cf265b040dd6ff2f80c62bcdb996146998d61294
SHA256cb7ef673d0eddc85daa80f065d97234f89e8cf3ce92818d0aa60c12e31755435
SHA5122f79f7ae497427fd5d67cff0ab0c2625e471cc5c5e73106b72053b1aab99cfe5ede814c9848fff13a85d8b6c265d76deabd2807fa75823600d24315a75b86c2b
-
Filesize
3KB
MD55f09ce111837e06bc9559541101fed7b
SHA16e109c5c47f7ee1f09a448975fe242aa6d12e94e
SHA2564abedb7419ea1f0c64c7488e64bde0ec7f85fddf6fa612fa18c6c22986dd0c54
SHA512dc8406b94dde90b743f65afc72cd5fe289cafedc7321c2599de184d239f58acc00272c47982cd46a33542dc1d562be408eea81e38a015cd4f28ac7e03743f217
-
Filesize
6KB
MD52615361e3dd0c50f04a466c153d83e54
SHA107d7fa51d2cd0cb88980a1a77d4a6113d386b25e
SHA25685a44b217e8a755890cd64291e848321b95a5d63e4b7290d14c75b206ca338b7
SHA5122b0549923edc8f2d508787e57c6e8321861e426e98d865fdf325c68ad05ff3e472eb7e4adff25fcc85972d6a40f28f54be05d59ed9ffbebac2d08d6e6bbf0ea8
-
Filesize
6KB
MD5f5b8dde9991d42ddeadbd9bc0e2aeb52
SHA11dbbf10b1955c74da31d3f2f38ad8652f62502a9
SHA256b6075d9284e4a33cebbfa3e0d8f9918bca66c8d32bce2421536d4f4f85d43198
SHA51254ea69ba5a5ea76058c0e32fe009adb282c9ce73bb08570e928749140e3f01b05192ed47fa9375d11f67381c5fa16ddfade7cb9ece27842cdcf55f2ffcf2d731
-
Filesize
6KB
MD52fe3f63a00005941ff5ac71f872006eb
SHA119ee7b50719ef37764401f91b317a6a68b0075c5
SHA2560cc14ef73ad561975ce4cf23d9f11c812cdfaf27e162cc58c5786a10ce1b9577
SHA512f3a8c4f9bf2a371fe89ca8cebd841f086d76843245f9d4cfb033907d68ab3f92861cff8fc8c7a53dd470033978f9ff2a4c5ca1259193754d6ee0366a05fe3741
-
Filesize
130KB
MD5f4275648645a4de2acbe0fff1c4f919d
SHA17c27567ee50b336a983deb254c06803359ac7890
SHA25670e30d2f58aafd07c3231dedfb12a1ffb52cd213c979d4b372892481b4d5c987
SHA51228d2a39865bf708fd5fad6ad86d86dafe4dbadad4b575ca00f7471cf7939ddbd983406cd7dd2d11d183cb3e33fbdc7d18321c41c012dd8c052920d1061a9d2ff
-
Filesize
130KB
MD56d039c5622e794475fdb7f46e571a453
SHA1b949a04017b824b54dc01d9d3cbc30e650008ff3
SHA25665fced3ee2e18afa48c3c86f9d2b828eb264a8e87b1a78c4c259ddb403ad6e31
SHA512ab39889b6d66eb6026d4654a0d2540e99aad68998d4d7e89b4fe5f4bf5076499515f2a516ff8f8a08dcb8d570436d59f218953be14ef0fdaa9281c03f0d2214f
-
Filesize
92KB
MD52f60ccbc7b300cb31a34c7b22883d9e5
SHA131647431e9334d7a27bc63b5383aaf18bdc232a6
SHA2564e3ced277710643e712ba60867b56c7dd2d32637d2d606a857056040a0f313f5
SHA512e5505c0e21dd9fddfbf31802c3cc20a7aa9111beb9e96b4196b0b49eb460de5ece8523674f625dbfdba968e19227f6276ad639062b2b7e8e03184581e93b2e3e
-
Filesize
92KB
MD59eb5d71fb516a6f941a205a8403f232e
SHA171fb571a97a8ea00aad76e1f8cbdeac232d4e60b
SHA2569540745329b76d028e7662c9e87837158fd69cf43bd9b0d53b0451fa9586fe4e
SHA512e1f2ff80554163eefe9893d5ada50bfc742f67b731afd56ba426954c249ea8cee83fe9042138f6ba7dfb40324ba714b2fe33073fa22458b340d10ca9b57a8827
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd