Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 18:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://file.io/xKJqJluxVFTA
Resource
win10v2004-20240226-en
General
-
Target
https://file.io/xKJqJluxVFTA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559519101091821" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4492 chrome.exe 4492 chrome.exe 7856 chrome.exe 7856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 45 IoCs
pid Process 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe Token: SeShutdownPrivilege 4492 chrome.exe Token: SeCreatePagefilePrivilege 4492 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe 4492 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 3772 4492 chrome.exe 88 PID 4492 wrote to memory of 3772 4492 chrome.exe 88 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4736 4492 chrome.exe 91 PID 4492 wrote to memory of 4252 4492 chrome.exe 92 PID 4492 wrote to memory of 4252 4492 chrome.exe 92 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93 PID 4492 wrote to memory of 3416 4492 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://file.io/xKJqJluxVFTA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa45409758,0x7ffa45409768,0x7ffa454097782⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:22⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3992 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2928 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2064 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2396 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3044 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3052 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5612 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5888 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5896 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=6180 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=6220 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6228 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=6380 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6756 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6952 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=7100 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=7116 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=7392 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=7404 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=7680 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=6908 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=7268 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=6292 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=7876 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=6728 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=7528 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=6352 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=8148 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=7244 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=8380 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=8424 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=8540 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=8756 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=8896 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=9112 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:7036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=9456 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=9500 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=9392 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:7708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=9732 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --mojo-platform-channel-handle=4588 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:6604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --mojo-platform-channel-handle=7300 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:5460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=9116 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=4548 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=9720 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:7856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --mojo-platform-channel-handle=6108 --field-trial-handle=1912,i,1433935291531333660,12495743422201222744,131072 /prefetch:12⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4896
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x48c1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5bdb0dc03af8fc3a5a31a3f84c4745d31
SHA118e64cd5156ccdc820f99364d24e8fb9d8ba26e5
SHA2567729f21dafafd541fccd1d1fc2df8ddeb744dca50f918ff2a9e08821978423a0
SHA51292f9a8efd630d45d3fc0328caffa1abbdff4e273adeb717abadd2bff3f479ad8d8c4d7112a8f55dd130cdc22748362d7eede4a36d95ae3c59c51890f5c17c6f7
-
Filesize
242KB
MD51062cd5142317e4fa358b3927b51fca9
SHA15426e16ba5796fcc278801c60c4d0ab5c67ad381
SHA256bdd9ca6f3470feaa6f6f8c820007c8c178f280e274fdd1fc0f70828bd3ebda1d
SHA512dbf51e3de71ff8026768845393bf12321600a33052da6bf3d01a91d0e219f6521bcae9c72f51974d98f09a2c85c2d183c263a005265a7e4c323c8b2409e5e878
-
Filesize
39KB
MD53c15d82c31b1f72e56cb24a4bb7de35f
SHA11de83c15ec4cd892b78281c09841d08bd5c88546
SHA2565c3b4a00731734287a76aecf82c7e07806c8943599de1582a5e680bf5a959fb6
SHA512ed8a127e4231ad2a5a539f135a379a60c68d83fb2f872bf57c6f26f3fa08f105543ed572bf53279dd7707240e460245bf07582c8dcfee09e5bcdde9d0b354968
-
Filesize
271B
MD5769f0278c80f500748407e9b00fd41cf
SHA13b5d69aeae1c0731861d240c31098faee5574943
SHA256ef7cf33b6ba4d4e1fba7f8837ab1b67fad32e19443bdbb8afe19aecd78417b2e
SHA512e797089a43662cacbcbf69533101d1a66291c85d6c3e530da5085749dfbcc274235cc1ca451ff0451e39413abc768a364db9e40bf16eaca333a40543bd2a62d2
-
Filesize
1KB
MD5f1ce43f662047add3d7eaa81495a0cf4
SHA15c7f593bb75c0675e32ed6fe03baf44a15589077
SHA2562deb7cf7a4ab4a7068fc025d4a080767d598efff553b736935374ccea80f4265
SHA5122628f4c9f028347c57ea9f1e4fd2d7effa6a9a4f334d01739cf79ee1d6a0f7b7fc965b7ac90820bdffe56ef277b4b0c73212b256969174126d69e71e09b88f8a
-
Filesize
1KB
MD55a40a657ce7a68260334626bd70e8e08
SHA1d0d7d6694d03205fec8f254874aa8addab556a2b
SHA256485a22e31ee6c8352ddfca0c3fa5734e41384ad4309b6e8ae1baee88f59f83ba
SHA51234f4529d1c3fdc52e6155c12c9c9e4ae5c4ebe0b6e14a051be153fc541dece40b8d4d7e99ec2751c3fad0b3120287b8cf6f61443c1f4549e95d98688b6a860b9
-
Filesize
12KB
MD5350c134db1cd627b95c2066362122e2c
SHA18717faff3574e386d002c0bfeb3a267de57b6bec
SHA25672b3d4ab402df2236d10ab1afd819e1a38246ae8bdd74a8db03d932272753484
SHA512a045d9d9fd1547bc2260c1b703ed387fb99b9cba76afa78786962f53d481569ba5fb1a9760e2685529cfbb5b2125f65bb7503541a33c68dd704dbeba5b6c0e0d
-
Filesize
12KB
MD5488657a47cabff74cca36d89d5ab9d19
SHA17e8aabc928722eaa17189d2aba9e957d243e95d0
SHA256247c90ea042e219cb847db9e030f5b7be176f4dc614b0c4abe6f123726ea7365
SHA51246e134a8fc82fb1f203b97a2d357bc05a4beb2f33e367d91a4ef37f97eecdbda0d9b64cfc358ee88e323378e867b1dd91c8b2e56c49fbf6546b69fc2ecfdace8
-
Filesize
1KB
MD51c11a1f8233645ab3f2d36ea610ee6d4
SHA15308b530ea1293dad843dca89db7f4c0c107f3fc
SHA256dcef87f633bddefb7fa0aa83f7b88c95f90b283fb3bc5c5bf7f1095f0c93996e
SHA512be32662908d8ed355a1f878d9186f6f02ffd1966387ad5fa87e6e924a2ed267a994ba21e726d43274e29f6980883fb8c52d74372b42d913908b12a9cb8b55295
-
Filesize
4KB
MD50423e7c5fdf1f636eda11208b12f15f9
SHA14fcafced39c44cd1374a2a139322cc6d2910f4b4
SHA256771ff78ffab71e9b89f770d7305cdeef801e19454c909b1cf55240b51711e030
SHA51219b26b4bcb473a5bfea16d7691bc5547c939eb581efa4d20b19a848eee2b22c13e8be3db308a404e2c12739a9fdec6ac735d2e950dedea503feeb62edda8734d
-
Filesize
6KB
MD5e6a8f1d164365519f3f1177f1a6a8a0a
SHA1d658161d1ba75a17c0ac61aa601eb07542bf9b1b
SHA25691cad322fad5ec4089851a2678df3eb8859389a5e33a2cff14f19fb8aed49a01
SHA512f244747e765a616bfbc80d34bc988e892c46e3f6b2ac749ae8eedbfe7ebb011aec60f644afdc5ca1f64f646edda4f6091b155a383a10d73083d682f70b57006a
-
Filesize
6KB
MD5954c26053325d34d5e253b8c067a6885
SHA1ad7e32c7477a75c20553fff6354d3316ac99600a
SHA256bbc62953dedee36e2e7c6fbdf8a54c7b9fcf12baa4fa322515d75e919c0a3815
SHA5121675168beddb48410226fce2581a3e96fd68bc85cfb9f4edacde4b9e11b7e96f427ff4ac1706f3cc74d246747ef40d3cab0cec937e1d4b64def6d7dfa6de9b1d
-
Filesize
6KB
MD515efe6210fdc947e77c9e815d5322772
SHA1adcd998b0a20ad169be1b2e4da806aec565652e0
SHA25625a846d27111518b527ec176d3ab774873a5830e1e9139337472d924a99deb47
SHA512ae8edf3653bdbcd0c610a499c270e20942707ffb1d63458260c045c2641a74260fe5156fa031150402f7124fecab11d21eb26df9380074885dfd8d8354cf33fe
-
Filesize
128KB
MD5763f36fb0416f921d4a99bac3340789d
SHA120e64594f5eab07928191b02b4baf637beb2ec70
SHA256cee4e9c13c40757571fbcb5efa647c17d6c56ed6dc8858deca73a21a522d3334
SHA51231a611cfa382ee2027e74a0fd933dbe8500164be1a19e8553cfc0ef48f8d6cb570d8fbc0a9b01b4ea7804047ccd79c2614b9d16a4a900197ce3304b6f5a12dcb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd