Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe
Resource
win11-20240426-en
General
-
Target
698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe
-
Size
1.1MB
-
MD5
2713b2e2dca103b7b9c10c9850257f49
-
SHA1
9d8f41324c20c47759a8961bb4a704acc449a1e0
-
SHA256
698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf
-
SHA512
1df4520f6aaa6507b547e7cef681699f7fa01490a313db1886304f82acbf39d7a3e8fbd452792844174e4adfd752349a115de014a4c7cb1b5b5528109d323fae
-
SSDEEP
24576:dqDEvCTbMWu7rQYlBQcBiT6rprG8aEX2+b+HdiJUO:dTvC/MTQYxsWR7aEX2+b+HoJU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625012362930817" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 3048 chrome.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 3048 chrome.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3048 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 83 PID 1604 wrote to memory of 3048 1604 698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe 83 PID 3048 wrote to memory of 2184 3048 chrome.exe 85 PID 3048 wrote to memory of 2184 3048 chrome.exe 85 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 3016 3048 chrome.exe 87 PID 3048 wrote to memory of 768 3048 chrome.exe 88 PID 3048 wrote to memory of 768 3048 chrome.exe 88 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89 PID 3048 wrote to memory of 1764 3048 chrome.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe"C:\Users\Admin\AppData\Local\Temp\698bffa6a2cc0f4a7d7cb499c12d52e69034067dd85ce5ab462098516a43b4cf.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2836ab58,0x7ffb2836ab68,0x7ffb2836ab783⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:23⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:83⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:83⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:83⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:83⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4380 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3236 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4436 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2588 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1548 --field-trial-handle=1936,i,3454432847243292013,16927814681077284994,131072 /prefetch:13⤵PID:3688
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5395e1b2590b15f20ed33906b48237506
SHA1e68f134d271a6dddd51eb4e275f902970ce592fd
SHA256ebf1db0e581a007d32d55cad6bf222cdd2a7efed8baea1e4c9508b23366617fb
SHA5122afc8b9d303884a6814fc4943276613026a19e94313275361861253f9365143dc21ac763f623c5f5e139d5531c9cfbf58b80632979519628d9993e0dcf7049b0
-
Filesize
129KB
MD55bb23f01c8cbf41d3368defcf3517135
SHA16a5e08f73d60ed8d7aaf521d3316db8378da7256
SHA256a279a99e995b7fdd5a78f0b4a9a3f7391d5161296a16f0734df083a7f6b789db
SHA51210e390f38f94807a7404565ecc2288d3d7ec0c6b3de684db5956c248c2583148a9916b829e4ada070a0e7d6c8c100d50fe4f74d3c483e80e17808293d9ed0723