Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 20:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u45022265.ct.sendgrid.net/ls/click?upn=u001.jVoAY4cSqIJLQ-2Fmblmfgf-2FezHrqSwrXnLWVWTmuUnK4-3DqT-0_M5qFUCEfjuU2p2CDDJnXApVBK2XdND4ewGgomv1kbv0CIi-2Bzm6Si0ML3d-2FuXIjCebbYAe-2BS8CpMB0NyyoLTA-2BLd0NabObxoXFK3E1HhTzroJ7hUxblWI-2BY-2F0rGjbiFcCpT-2BXbWwtYXb4n9mIkGNH5wY3LdGZ2r3y2I2AzxBWw0feHoMNVmhFkSNnL8bmFS3rfGbC-2FxAOd42gND1K51q77gUGTEV0p-2FHFStjqToOH3h89N119JTMVKbZV58jqr1yRNP61Nvnwy9s8zqGCBrmdiedVuodgvrjdMkMQYgS3-2FRgMIdvE1-2BD-2FuooKH0GFhNYBW1npGG8NhDjFkTH2rOvq3oOOb-2FOKznQRmC9W530Q2MOXx-2BqqPyqOcmbQd-2FeWAeEtamim9Fw2qw0GFQ4mWw2xIzf5rw-2BFZUXbA7uRL2-2BUqdC8q7wYcQ420ymoCQvMj-2FjY-2FZawdWv1u7KypHBThvRwLi0EXVs7gZpta6P1ROrtU088P3XltUeZqgqecMPczNjB-2BKmWAjoiUFcBtbsKmF9n3FgRIb16XyKN5PR45Tkb5oqftaz6PkWOvnUFPuPM-2F5cyaBMBXRFc1acAoDIS-2BY-2B5UZn-2BsnKg437ZAXpm7cefhZ1R1PQM-2BamqmhaMkgHOd-2FOor-2FhmrBZSb9zOSzKvmkGuxkaYZIntaxP2bWrnpZNHJZGcroPwRVcBHzGODV9riXKG7ZmjYqUYmVqYrb-2BA3QEPnpkIDNFBNYgOu-2BYVHsF5xy13RrwxFfgJAaYYOS90xkU6XcyND4rXGWQab0vumL51E8U09Oeth-2F2-2F1iG7-2BLby-2BfaZV17zuojZcV9K5zXx9JTmHBWjLAtk4HE4A8DpdEcfc2S07hLWfQ9He-2F415LI33BIzZ5AnLyUS6CplAvo2NU81
Resource
win10v2004-20240508-en
General
-
Target
https://u45022265.ct.sendgrid.net/ls/click?upn=u001.jVoAY4cSqIJLQ-2Fmblmfgf-2FezHrqSwrXnLWVWTmuUnK4-3DqT-0_M5qFUCEfjuU2p2CDDJnXApVBK2XdND4ewGgomv1kbv0CIi-2Bzm6Si0ML3d-2FuXIjCebbYAe-2BS8CpMB0NyyoLTA-2BLd0NabObxoXFK3E1HhTzroJ7hUxblWI-2BY-2F0rGjbiFcCpT-2BXbWwtYXb4n9mIkGNH5wY3LdGZ2r3y2I2AzxBWw0feHoMNVmhFkSNnL8bmFS3rfGbC-2FxAOd42gND1K51q77gUGTEV0p-2FHFStjqToOH3h89N119JTMVKbZV58jqr1yRNP61Nvnwy9s8zqGCBrmdiedVuodgvrjdMkMQYgS3-2FRgMIdvE1-2BD-2FuooKH0GFhNYBW1npGG8NhDjFkTH2rOvq3oOOb-2FOKznQRmC9W530Q2MOXx-2BqqPyqOcmbQd-2FeWAeEtamim9Fw2qw0GFQ4mWw2xIzf5rw-2BFZUXbA7uRL2-2BUqdC8q7wYcQ420ymoCQvMj-2FjY-2FZawdWv1u7KypHBThvRwLi0EXVs7gZpta6P1ROrtU088P3XltUeZqgqecMPczNjB-2BKmWAjoiUFcBtbsKmF9n3FgRIb16XyKN5PR45Tkb5oqftaz6PkWOvnUFPuPM-2F5cyaBMBXRFc1acAoDIS-2BY-2B5UZn-2BsnKg437ZAXpm7cefhZ1R1PQM-2BamqmhaMkgHOd-2FOor-2FhmrBZSb9zOSzKvmkGuxkaYZIntaxP2bWrnpZNHJZGcroPwRVcBHzGODV9riXKG7ZmjYqUYmVqYrb-2BA3QEPnpkIDNFBNYgOu-2BYVHsF5xy13RrwxFfgJAaYYOS90xkU6XcyND4rXGWQab0vumL51E8U09Oeth-2F2-2F1iG7-2BLby-2BfaZV17zuojZcV9K5zXx9JTmHBWjLAtk4HE4A8DpdEcfc2S07hLWfQ9He-2F415LI33BIzZ5AnLyUS6CplAvo2NU81
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626125309007829" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 4036 chrome.exe 4036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1568 1196 chrome.exe 81 PID 1196 wrote to memory of 1568 1196 chrome.exe 81 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 1132 1196 chrome.exe 84 PID 1196 wrote to memory of 2612 1196 chrome.exe 85 PID 1196 wrote to memory of 2612 1196 chrome.exe 85 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86 PID 1196 wrote to memory of 756 1196 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u45022265.ct.sendgrid.net/ls/click?upn=u001.jVoAY4cSqIJLQ-2Fmblmfgf-2FezHrqSwrXnLWVWTmuUnK4-3DqT-0_M5qFUCEfjuU2p2CDDJnXApVBK2XdND4ewGgomv1kbv0CIi-2Bzm6Si0ML3d-2FuXIjCebbYAe-2BS8CpMB0NyyoLTA-2BLd0NabObxoXFK3E1HhTzroJ7hUxblWI-2BY-2F0rGjbiFcCpT-2BXbWwtYXb4n9mIkGNH5wY3LdGZ2r3y2I2AzxBWw0feHoMNVmhFkSNnL8bmFS3rfGbC-2FxAOd42gND1K51q77gUGTEV0p-2FHFStjqToOH3h89N119JTMVKbZV58jqr1yRNP61Nvnwy9s8zqGCBrmdiedVuodgvrjdMkMQYgS3-2FRgMIdvE1-2BD-2FuooKH0GFhNYBW1npGG8NhDjFkTH2rOvq3oOOb-2FOKznQRmC9W530Q2MOXx-2BqqPyqOcmbQd-2FeWAeEtamim9Fw2qw0GFQ4mWw2xIzf5rw-2BFZUXbA7uRL2-2BUqdC8q7wYcQ420ymoCQvMj-2FjY-2FZawdWv1u7KypHBThvRwLi0EXVs7gZpta6P1ROrtU088P3XltUeZqgqecMPczNjB-2BKmWAjoiUFcBtbsKmF9n3FgRIb16XyKN5PR45Tkb5oqftaz6PkWOvnUFPuPM-2F5cyaBMBXRFc1acAoDIS-2BY-2B5UZn-2BsnKg437ZAXpm7cefhZ1R1PQM-2BamqmhaMkgHOd-2FOor-2FhmrBZSb9zOSzKvmkGuxkaYZIntaxP2bWrnpZNHJZGcroPwRVcBHzGODV9riXKG7ZmjYqUYmVqYrb-2BA3QEPnpkIDNFBNYgOu-2BYVHsF5xy13RrwxFfgJAaYYOS90xkU6XcyND4rXGWQab0vumL51E8U09Oeth-2F2-2F1iG7-2BLby-2BfaZV17zuojZcV9K5zXx9JTmHBWjLAtk4HE4A8DpdEcfc2S07hLWfQ9He-2F415LI33BIzZ5AnLyUS6CplAvo2NU811⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37dab58,0x7ffaa37dab68,0x7ffaa37dab782⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:22⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4968 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3200 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5108 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1460 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3676 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2456 --field-trial-handle=1852,i,12504702485498836045,11071025271735954896,131072 /prefetch:12⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD57fde7edda327ac8297da984632952471
SHA1d19adcdc10cf3343b2e4718a74dc6ad3e56f3031
SHA256c4fb386f02dbd576c2dabd2873fd2002bf2cc1312d5f254a11056c3afd4e2bf6
SHA512e1d65106a038f1e7c1e2f05ada09a2fa9b5bc22434fc3342d47b2d93f1a1cc555318f3bb30e827f3350e6a300d657a0e9ad8783797baecd0b9afae8442314d00
-
Filesize
255KB
MD5766dc895fef71ecf0d7044bd7f967a76
SHA18eeb7726b665c68f1d37ed0e19f75d61a0e96b97
SHA256ea77419c44ba50c701ecda012a28442254e1e61a5100650eb827ec90215d11b6
SHA5129ebdffd7e87a2049bc6f0064da30efa600a3e99f1f4cdd3b729fc8f46b4c63fe012eab2fac2d8c6055041c3faa31e156dc4c2d69e2ae8550aaa12e703afd3f6c