Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 09:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url7873.aem-dealerspike.com/ls/click?upn=u001.uXwmwUcM9GA1BExe-2BfAdJLcWkoC-2B8-2Fr4-2Fy55I9WN7vyOLsqGsdwWkgHbBfS5DSo36jFYqOKHuXaJeZJ3uKhZVr6TTXKsGvokRhrQrGMwx-2BJW92ay1W8-2FqSg7SVd4rbAFHsc5C5Ee1rZ1Wb-2B7vPaMTw-3D-3DoGFS_YmEw120ugRZJH4o1BSu9-2FXtPzMJVp-2B0Tash6PD0013EQ8WvWaBiXgQ8B51uX3FSI3grJq2G1h6zCPSgqbCL-2F1ydI1v-2B9802ridE8oBjSktOfp-2FEKtWFT5DjbXo0XXHX6kZ-2FwReY5KM6zNeyq91nOWx4wpZ6uacMIhBeRTp7JTVUVQBu1fDJfTtMd5VC5D5tTIDx5iXtIzt7CcsDfbHObOjvgzJHIjNjgwr-2B-2F2DnmBr505cM3H-2FY3HAv7MBGe3xMbauAm8Mc6t3F6CIFnN1EQKBi8TNsJz2PzcQ9vuDjkdo-2B-2BO-2BZlTV-2FJNkfx4H-2Br8RYtPj1koyX9KtPeg2RJ283CgQhZeVZoFRcC5XLk7lokFOChPjcC78S9VOeOHdZaKbdG51XmkJEeinJyJ-2Bqmh-2Fv2A3UkDpkBWhbN8Qo9FqL72oYHPX73xQol1cEvp4S1kgD1
Resource
win10v2004-20240226-en
General
-
Target
http://url7873.aem-dealerspike.com/ls/click?upn=u001.uXwmwUcM9GA1BExe-2BfAdJLcWkoC-2B8-2Fr4-2Fy55I9WN7vyOLsqGsdwWkgHbBfS5DSo36jFYqOKHuXaJeZJ3uKhZVr6TTXKsGvokRhrQrGMwx-2BJW92ay1W8-2FqSg7SVd4rbAFHsc5C5Ee1rZ1Wb-2B7vPaMTw-3D-3DoGFS_YmEw120ugRZJH4o1BSu9-2FXtPzMJVp-2B0Tash6PD0013EQ8WvWaBiXgQ8B51uX3FSI3grJq2G1h6zCPSgqbCL-2F1ydI1v-2B9802ridE8oBjSktOfp-2FEKtWFT5DjbXo0XXHX6kZ-2FwReY5KM6zNeyq91nOWx4wpZ6uacMIhBeRTp7JTVUVQBu1fDJfTtMd5VC5D5tTIDx5iXtIzt7CcsDfbHObOjvgzJHIjNjgwr-2B-2F2DnmBr505cM3H-2FY3HAv7MBGe3xMbauAm8Mc6t3F6CIFnN1EQKBi8TNsJz2PzcQ9vuDjkdo-2B-2BO-2BZlTV-2FJNkfx4H-2Br8RYtPj1koyX9KtPeg2RJ283CgQhZeVZoFRcC5XLk7lokFOChPjcC78S9VOeOHdZaKbdG51XmkJEeinJyJ-2Bqmh-2Fv2A3UkDpkBWhbN8Qo9FqL72oYHPX73xQol1cEvp4S1kgD1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547094058137346" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-566096764-1992588923-1249862864-1000\{A9F38BDB-1965-48B8-A2E1-52AE5CB259D4} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 5644 chrome.exe 5644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3812 3004 chrome.exe 87 PID 3004 wrote to memory of 3812 3004 chrome.exe 87 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 5112 3004 chrome.exe 93 PID 3004 wrote to memory of 3360 3004 chrome.exe 94 PID 3004 wrote to memory of 3360 3004 chrome.exe 94 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95 PID 3004 wrote to memory of 4940 3004 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url7873.aem-dealerspike.com/ls/click?upn=u001.uXwmwUcM9GA1BExe-2BfAdJLcWkoC-2B8-2Fr4-2Fy55I9WN7vyOLsqGsdwWkgHbBfS5DSo36jFYqOKHuXaJeZJ3uKhZVr6TTXKsGvokRhrQrGMwx-2BJW92ay1W8-2FqSg7SVd4rbAFHsc5C5Ee1rZ1Wb-2B7vPaMTw-3D-3DoGFS_YmEw120ugRZJH4o1BSu9-2FXtPzMJVp-2B0Tash6PD0013EQ8WvWaBiXgQ8B51uX3FSI3grJq2G1h6zCPSgqbCL-2F1ydI1v-2B9802ridE8oBjSktOfp-2FEKtWFT5DjbXo0XXHX6kZ-2FwReY5KM6zNeyq91nOWx4wpZ6uacMIhBeRTp7JTVUVQBu1fDJfTtMd5VC5D5tTIDx5iXtIzt7CcsDfbHObOjvgzJHIjNjgwr-2B-2F2DnmBr505cM3H-2FY3HAv7MBGe3xMbauAm8Mc6t3F6CIFnN1EQKBi8TNsJz2PzcQ9vuDjkdo-2B-2BO-2BZlTV-2FJNkfx4H-2Br8RYtPj1koyX9KtPeg2RJ283CgQhZeVZoFRcC5XLk7lokFOChPjcC78S9VOeOHdZaKbdG51XmkJEeinJyJ-2Bqmh-2Fv2A3UkDpkBWhbN8Qo9FqL72oYHPX73xQol1cEvp4S1kgD11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f4279758,0x7ff8f4279768,0x7ff8f42797782⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:22⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:82⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:12⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5028 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:82⤵
- Modifies registry class
PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5368 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5792 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4052 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:82⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3152 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3736 --field-trial-handle=1848,i,6051045329678212863,5264717815180235281,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5644
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD58dc1eb29bf1e09f5acecf1ffbd9f9ed3
SHA19bade6332a4067eec3f1f5bcced64bea41c968b4
SHA256286bf0e895a1bbfa25c51ff26ffb8eb49f8c7ff29901295cc8a3da8b558f4e88
SHA5129e7b9d883aae1a2fe85064abcbdb3fef1e720609567574b03e456fe695104b1480aa432c5d07431dfa6a7fb81eaf020fdb173bd582081732be480816977f6c12
-
Filesize
1KB
MD5586e1497a35c4aae2b91d9a03bf7ffe9
SHA1c3cb4e5970e1c9d01bd87c9f3c10991bdad10803
SHA256f101693df98b0820460b8031ba762c7de6bc3b51c679d2fbcda05028aea11472
SHA5120dad76c7fd4d041d43b83fef3a227bc0d3c26bb49798bd75211dc587c3cf488360deab8113a54108ebd21b43edeb30ab162dbd85ff7d8ee8c7139ef2f82803fc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\001\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
4KB
MD5a3d2ae8db96ae26d23fdd53314e62846
SHA1439ba5a93c068c1a226a8f19fdad3ccb38e56cd1
SHA256dedbf6fc947b734b29f9f9a84373c920bf68ee8e9f5fc85ce6fd8cf4f3202c99
SHA5126a0e4069ce6cc695e5a42cd05916da06ccc5c6a1e5a9819edb43505fbdcb220feedf9e3ca7c6c5010cba70af62f143c1e7b4de20aae88a5f44d99da00905f95c
-
Filesize
2KB
MD5d362d5feadc1de5d7f7d76bc86479cf6
SHA11cc396c8374d335a2e4bc4366b8cd2320447cf5d
SHA25683e6533ee0d5f41d0ba55f4c5085cf4d68f89d907b2eac60302830c2f14fa7f6
SHA5121c67331df4085ac2f60ac4eada4e12500fd865268f63f49276cae20cf152768fee1c3fa5565198c0bdb7a3968d3d4e3bd9d5e8ca2a4dfb9bb6b2643d3929a695
-
Filesize
1KB
MD549068300ad686de537783a48c71ba1a9
SHA1d1c5e405988b9a59259be71be8a2b6f1b93e76be
SHA25691e613a8bc7a07b10536cdbfb108bed258535940a9ece22b6b5bbd3f97745332
SHA5121e65114bbad190e65a8e913e0352e526e4ecde7100e0662dbfeeee2485b7fa10fc9fe9ece4735a71014eb1a08108044589b66b3e1754fdcbcd79df3723af10f6
-
Filesize
2KB
MD563bcdb08e0df3f1a433b25f77416cc06
SHA17df668c46732ee3cf589af90ffdb36155c0cb76c
SHA25608cc58972e3b36a8d8f02a2a82816c9386435a645908f4258ec87ec47255b1a7
SHA512bdacf5dfa5be28f960e735140df7fca6da66eefc734d54e785041b1b30a7f5f8bd3c2fc5688ee693735eb53b3e5bf01af9f671be32dcd5f0513092158a5043a2
-
Filesize
6KB
MD501c373b9007b1f6a90e282ff3f21f06b
SHA15bc845336300d175f62c2c4babcfd35b4907bf53
SHA256b9adbb051b5992a00d7c863b32575e4f412bf805a8544b88d874d5192ab40c2b
SHA5129329a0b2b414f7d0144d078f16243fddf81dd78e43e98b7b7c17fa908b2980d4cdbf6540fe91ffdddcec0c0487eda6e40198f93736f2aa488826948e82d14c62
-
Filesize
6KB
MD5f82003f72779dbe4a411ad1d6baf4b76
SHA156664e8ac9894af37988735340fb7ccace5d0643
SHA25636e8dc2bed06dd1d3cecdc8483d7de86f1ab364664350d3d50926da68910699b
SHA5126844b918ce247a301cd0b1c479aed1fa5bfa2b43f4b77f1c42676b246ffa8f6ccae573531785dc405ca42d203dbf10eb12a90e00cd21f9c17f48b9a40dfbe2f1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd