Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/05/2024, 23:05
240522-22ykqsce26 122/05/2024, 23:02
240522-21b1cacd3x 122/05/2024, 22:56
240522-2w3bqscb8y 122/05/2024, 22:53
240522-2vgcwacb56 122/05/2024, 22:49
240522-2rxkpaca45 122/05/2024, 22:46
240522-2qbltsbh4y 1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 23:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://asf
Resource
win10v2004-20240508-en
General
-
Target
http://asf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608927529162727" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{1F90CA7A-D764-442A-9D9D-345EF39506C2} msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5216 chrome.exe 5216 chrome.exe 1980 chrome.exe 1980 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5216 wrote to memory of 5284 5216 chrome.exe 123 PID 5216 wrote to memory of 5284 5216 chrome.exe 123 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5448 5216 chrome.exe 124 PID 5216 wrote to memory of 5456 5216 chrome.exe 125 PID 5216 wrote to memory of 5456 5216 chrome.exe 125 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126 PID 5216 wrote to memory of 5496 5216 chrome.exe 126
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://asf1⤵PID:4380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4372,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4264 /prefetch:11⤵PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4484,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=3968 /prefetch:11⤵PID:2520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4408,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:11⤵PID:2460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5432,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:81⤵PID:1976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5656,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:81⤵PID:1244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5936,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=5976 /prefetch:11⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6108,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4704 /prefetch:11⤵PID:3372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5128,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6172 /prefetch:81⤵PID:4804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6104,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:81⤵PID:4336
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x2fc1⤵PID:3856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=6256,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6276 /prefetch:11⤵PID:1920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=6524,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6544 /prefetch:11⤵PID:3068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6424,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6760 /prefetch:81⤵PID:2340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --field-trial-handle=6112,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6736 /prefetch:11⤵PID:4264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --field-trial-handle=6964,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:11⤵PID:1316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5924,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6504 /prefetch:81⤵
- Modifies registry class
PID:4844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --field-trial-handle=7040,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=7056 /prefetch:11⤵PID:3540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb40f2ab58,0x7ffb40f2ab68,0x7ffb40f2ab782⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:22⤵PID:5448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:5552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4288 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4312 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4336 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3744 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:82⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4824 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4252 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:6104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4592 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5548 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4680 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5524 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5108 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4632 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5372 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 --field-trial-handle=2016,i,17960162112418378759,8768749519630283907,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=7132,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:81⤵PID:5932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=6892,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=6620 /prefetch:81⤵PID:5816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD50ed8278b11742681d994e5f5b44b8d3d
SHA128711624d01da8dbd0aa4aad8629d5b0f703441e
SHA256354730711c3ca9845bf98ec5dfb58a16e50984f9edcf0e8f432742326334f8a2
SHA512d296ab1f1b418b125f09598ca6645d984a1cf67092a914956b8879d285ee35521b408363b47da195de79086e3be3ed9b1709bc8f9cd2e32d5dccb720a010bc8c
-
Filesize
326KB
MD57cffd89bb44544bc4f20ee1c94dc657f
SHA1ee031ef3dcd6ebbb3a76a4811d1e6a20d35032ce
SHA25627368a0a7e3c084ca2ce66d687a0b85bd2b3ea1cff7b33a309a52ea76fa66300
SHA512c85ecc7d64d5fd8e9e806964c2f33ce0dc117f89557f8fa1ad1a8a3f8a53c5643a34b438b1e5fec7bfd051fdedee7c6e2a3f770b010f5dbcc402e882d7b7be05
-
Filesize
133KB
MD555d6cb866edd0f6999ce671afd500ea0
SHA1499c8483f5697def99d59dc980d6fc4dedb1f8f4
SHA256acd57efc9783c90d9eecb8e1cf9f3fb8c89b4dd0c10b46391f67457629758c1b
SHA512b93b674d91d8c424da4dad219f8dd1f3a171915dd5eeb99f80ec16f26caf0fcdefc7ccdf547f6ff8471662331e65dc77f2a11819996ba872acac46d5b8ee7d26
-
Filesize
249KB
MD5aa5e662f4dc33ccb53d1f01874e0edc5
SHA14ace712ea7fe6d79e1aff04e95db7125920fda43
SHA2568d25fdab7903fd2d92b501e311ce9f290f3e3a129b72f1a2ff6ca39b35a07a97
SHA5125d282540fedaebf505edb201784b60086f4c8705cf99536b4fdaac392d5b684e9ab86256b16738be6b522ac25d0054656fc083a5c31efb5f99cd759b689abf2e
-
Filesize
163KB
MD5a224036f35dd91d2584ad927626f01fc
SHA1a58eaad633b7cf6be1894af0b3bbc340d9347709
SHA2563fb7a26d906490c9cb219272917a4e14e4c2674cf2ddfd51a38c79214bfe8b68
SHA512843efbff949eb000e482f8131a6c06ded3c9f66a10981cd6c989c8514ce86ca591343f9c3bc416beab6b11fd8335e7ad1bd7c6912e3b4ac0dbbb775c5a7ce99c
-
Filesize
222KB
MD5ffa095ad43fda9e7b64973ecbfed21b4
SHA14d2635ef56b4617968394967319ad4727b3c85c4
SHA256ba267459029a30051db5d96f2a2f6b976444f494555425673f03796c1f8a1b67
SHA512f5b22253f5a6b65beeb697ff3cbf72d8878feb616c3dca05dc2dd9b1d3d3674e5d681d208377d4a9ca3d7134d5f2690446ccd42a64b9bea82b88d998d8d2b3d7
-
Filesize
42KB
MD5a677f33722a3bdf35e0422681511a7e5
SHA17334848df1d00e5d4d3763c8bb866fdc0229fef4
SHA256883e52d794da9795f687fa10e649ffc186889e18b8ff0c57a0701eae43d97348
SHA5127d9f1ae7a1cfa879cc2ab16a35714bbd76011968ea66656e32e8d9c882bdd2c1ba01cceb7a632279804c686fd466fb4cf34ca504a43114ff0e212325fadf022b
-
Filesize
1KB
MD505f1d04824a5cc13cd1e9dcb5b642a4c
SHA1be8832241793627f96c4f751b5fdca0ba1fcd687
SHA25682393cd59dd0933876e2d406d37525cc40becf83d8c79047fe5c40b21ba25656
SHA51293962f37c9974bca814288821b3666a01280365f9310bf779e3d8ce9d2c1b44e4514eaf38d9b6b8a20ca564084eef2ea75ce5e57ae3769e02b84236186f4a7a2
-
Filesize
1KB
MD563545ac5511bbeba282204cbb78e1094
SHA13b765eb7f672edc7762371a561f9af4f77844390
SHA256d2973dce8df0b8efcf8a80c463d6cab645acacea367aa4d2ac544c040b4d259e
SHA512158d0a659370e38e2913796c89e70b743c315fdc5b3694bef164df560346e5a424689e5c0bc6dc055a8a0947ca03f01e3497f67a93ae4d5db849ab3e7cb795b8
-
Filesize
4KB
MD578c959f4b46063685ced1ccb6b5f48a4
SHA12b5ffcc6efe31ed84a073ad439309a38774bb9ab
SHA2566e206a84e5b8ab8e4523d9bfa50cec567ca04c2381fcb879356558e2b62398ab
SHA51294e9104c5d8ec0b2592a77fe6e3dfd7ee63ac6b6db5a10120cb2625faae85feefaad806356108584e0a6b27beacbc365b28f400f1d1950af2e1a38e268fefeef
-
Filesize
524B
MD500d09334bce60a54976dd908d8a891c4
SHA1525ab69657e2bf4f47651b5362719c46e433c720
SHA2560ba7bbccaaea19ff94f48bd0f4e0bd50a38bf601657272f520784d26487ecd78
SHA51268ecd7848f07ebf3a4d6c0f1096b81b9222d17a7313635f26da19a8ee5d2aa7cb027c3c4159263272937222f55ba8f32db7458e8f3c22c5e32e9f31d184af026
-
Filesize
524B
MD5c3a774b8548878fc8e6a0c52a1d5e7cc
SHA1e94e3c85d0e071589367c7b649f4b402bc897459
SHA2565b1eb954db89f8708c3e04cd29e23dc5d3f54b14fc2e7bc1c90e7ec8924b6d79
SHA5122f45ee1e6fd986a726e3693473381a783acdbb4170153eb87ec9d5b45629ee59566ff055a653378b0b1b6ff4e3caeeb042c0e456b8c468a99d538187ad2869df
-
Filesize
691B
MD5121bc343ef7c12a20a2c74a50d951877
SHA1448b9e582684ecde616a1d83263ba0ffc8e5850b
SHA2569de0a12a257c67050fccff7faf22c856de58afd31e09f364d8485b2926cf8b33
SHA512bc1b1f804e42894e2680d1dbee6b3535387cfbdd68a661a835003f69274d755dbc92a4f727dc1ada3cd6864a886e10e864dd443205f917ff4f2eddcd27b39fb0
-
Filesize
855B
MD5b0cba32a2ccef9dc7da833b6b3bcaed4
SHA103acfd2e79bab27e1fedd6ae54050f60d710a4f9
SHA2561171aec6eee8e57d5b27951bd9b1d06356c2ec2d4674db50c7bbeacfc2745426
SHA5123a2c2ea4bcf53bb1f9e6bc60ad8abadc0d9d6664f317d15fa1a4aa3cb37108785a2856adb7d8c998b3e449306cf7a1f5da1d8319c4d3b73e390487603917bea9
-
Filesize
855B
MD567ad637bff1245a4e620d8d62c12e726
SHA1c07ba49bdd09f8fb8437fd3e7be013e15e499edd
SHA256a03f51d2ec085baad436d7afff2d6af9343658e678cf3f2d78d35cb1d7d0c98d
SHA512543aed9d1ee6479cfad350894f88088a064252c2dc743383334c971650a963efaae8b580c6aebeceaf852815065e768d4091deb39dff29b0296418032b7cbd45
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\fbf9616b-50a8-4e16-9670-05c1ec7267b1.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5e2f7826ec6d5755b23f1e3d6c6b1bc76
SHA131bc757b6f4d3bb6d01aebf44ef37b88e4aca59d
SHA256912e49f2707fed34906ab2445e8681cf6044d45f977851bbce4364d241afc86b
SHA512bd0c979fe96845f75c663b281b6030dde55f3450a9ede8f8e922b6ac83b20748b553403a0517529418cd4558e68d37ea27c793a5a8cf217a9a85053ec49f88f4
-
Filesize
7KB
MD5e904a86aa2a6710d2f5482eb9427ec65
SHA1deecffef9d42962a11530f393d7c6373584e8116
SHA25671a14ee44ff4f09d76a69c3b48cbd43b7557f766a4eacdb17f6c584b5a6fb84b
SHA512e1d4726c48690d4393f6aa0862bff35b6ea5da167417b322db223794ffc29e9d5a3c91b6f5d61250a38e1f0a9feb9e500daf5fd8d6ce95e854b2c6e9fb544631
-
Filesize
7KB
MD56d25938df88e1697e9b76401098a096d
SHA11615e71a6a98ef01ec15074306faab1abb713bf0
SHA2565600ccf0adcb52ed5a77ff754777da45eb10602cc791100937185cf658d6c5aa
SHA512a7f6177971c0e554cc80501b0cbab69f7f47dcf2554ee99a13be59d8c85e7d310a3fc6cbd24257845ed72bdcabeed0cf2b0c0be8de1017581683d52dbb113ccc
-
Filesize
7KB
MD5bfb2367c7f98e9cb29f6dd7bc01fc771
SHA1c78b12cc8a795230cc37ebb2db5f739af2f36ab8
SHA256934ac5921b13dcc872ddb8f388b11b886f0f106825f144ca63cf1356401a8444
SHA512dcd986ee72c5e2bcfe34419b5d1bbcdd14bfbe4bd8fb09d8d1b795abc9d0221028df34866eb55f98fc1ab7fd77af40990cbc16a2b7fe5b4741fb9127dc12fdb8
-
Filesize
16KB
MD5075250f1c1343e2024f9c8c28a37787d
SHA1e75b9a9f3412b584a4c7b803747192b24362f54b
SHA256f57dac120da2cb9cb57066a21be802145acc455007f4ff600cefa9b32a73923c
SHA512c09b44a31af69540a704dc2ab09fd77a72f271818bf00215a866c11ae5b360db89b8a02b8ece9aae0ac58a9b6f0abd9ed61fa5ad1b6824ea8c9d5a00fdcacbda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5957bb.TMP
Filesize120B
MD57444e0008fee83118993b5723376f47b
SHA1b6720570daf49cd78d6e4819c23548194549936e
SHA2567d6079944c21d9ef3eedeb5e65ad8cebf4442da7f727d527578d484c6401d7d6
SHA5129b8cf824abd605d4852add38e175030751c38c82b6174cb365855121b61543dc48f87892135ed608205949d8d39f3d62ccd410bdf1a7d0a954bbcd57aa5e0759
-
Filesize
260KB
MD59e6cd48ff3bb01301c818f29b9de3983
SHA1caa51aa2f24abdd2e0fb0454e3eb26d4750249d6
SHA2569edb2c00485801f425086a982b9a51952e48716a10f39d42aca3cc2a7e0330bd
SHA5127b08d36544692bfcd5870b605f8ff02ea5576b427911e05d7da66631f1af920b923a25fc3eefc4d53af5af5fb0d5280c507f4b4028a3024ee47c590d3bcc552f