Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe
Resource
win11-20240611-en
General
-
Target
59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe
-
Size
1.1MB
-
MD5
1fbd1e7c3fa11e704f202677669931f5
-
SHA1
71b4418afc920cb3d9c4222a475e1225bd308578
-
SHA256
59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0
-
SHA512
ec40acb37a4730931d72b2a0fcc150086973ab3de43a2fae35125a5a48fb5dd7bc34fc9f2a3fa233f46d5a36c66153bf91e73356201c4ef032312869d2fea3b4
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aue2+b+HdiJUX:bTvC/MTQYxsWR7aue2+b+HoJU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133630251759424848" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3169499791-3545231813-3156325206-1000\{BBA44168-F86D-44D8-9EC1-60225E4344F8} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 392 chrome.exe 392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 2432 chrome.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2432 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 82 PID 1228 wrote to memory of 2432 1228 59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe 82 PID 2432 wrote to memory of 1012 2432 chrome.exe 84 PID 2432 wrote to memory of 1012 2432 chrome.exe 84 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 680 2432 chrome.exe 85 PID 2432 wrote to memory of 3692 2432 chrome.exe 86 PID 2432 wrote to memory of 3692 2432 chrome.exe 86 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87 PID 2432 wrote to memory of 2560 2432 chrome.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe"C:\Users\Admin\AppData\Local\Temp\59d9cfbab3447809ba3eb0109305dc10beb8331585c6ca2e03e4b23225f710f0.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8876cab58,0x7ff8876cab68,0x7ff8876cab783⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:23⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:13⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:13⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4348 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:13⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3280 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:13⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4000 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3284 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵
- Modifies registry class
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:83⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1928,i,12565148711998707969,11509905426869016216,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5c26d3f1397959d1c8dca69523564944d
SHA1cf5ad0f41be473d566815c5d33eb4397fe9eb943
SHA256493bb05dae817441a0b520435209e7e08d2a248cab70ec16600ea706d0901f0f
SHA5128aa8452231276f7a1c2dd5610bd8edc2c50334510feb52b4255c0b123fddaf42c0157bbf206ed0658f52fb6694ba70c3eb4f2e585dda0dec1209682c0b9a2c93
-
Filesize
3KB
MD5b0419f19d6bfada63a1a2aec7f70c8c1
SHA16a64dd0936da3dd032dcc617a53b9bbe6a7d7c6c
SHA2566aef2c16958d5131c3f98d43244013839d074f16f61938647069deecb892be02
SHA512849aad681fd398352c56a876bc92913b4f4ec0455ced92137c08fceda86b6a48c4e66dd9142cbf012b12eae74526e3f2ff5e3b198f9be673ae1270aeabbf7144
-
Filesize
2KB
MD5c8cc49b6a525ac10aae59f1b94c4fb1d
SHA1bb6029a6f3f865ee6178277a37fb54d057956d37
SHA256ed70266b1e2e0db0bd829c436d4daa46a73c11554cd3960b7a7a7cce112f989b
SHA5125f437467f7b1dc4342beed60757d584dcb31a99faa7f1c9ca1119413b00238a9f5d2bd05cc270da146716a89e4cae8804bd6e04c0d90636c0b467c43f982dc1c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5ca667921f8e94bbebcac463dfa1b2bb2
SHA15e87f1dbe080136a0488abb59720839b32d5d57d
SHA2569163d543b8df18e0fecca586f52da24362a183e7cd5ca7ac38239eca4a40e620
SHA512981dc9751fbdc5e968d6953eaeca0ff8bd9a7a08ab67c5d13e9f8d982fa965bb0fa7013b0ddb2fb67c344829e61d75b941f85e4e498c519f4fc65f47f326f103
-
Filesize
522B
MD5a44825e86d9bf85336507f5d890721fd
SHA1ccd506dbd4bb36646d4532844e5830f7652eb816
SHA25629685e4c2294f54b9fa0ddc1f1cbc4f262cd5ec63d287359fb929fcc8e3c8739
SHA5125d6b57dd33d18229a538a37639bd58c1a1af4ecd3b4a004b5109b34005c297e843d3836457b8a25ee6346a48cb9cb4e15cf8490e14106fcfcdb40b5cd9efe448
-
Filesize
7KB
MD56e92653189087bac584e62c90226bf07
SHA19962d598878295dcab35990a718e6cde494db1d1
SHA2566416661b4a43862d72b1fbf9b9d6895f8eacefa016409bb078a2913cca4522ed
SHA512900fdf95ac5f96aa9e83782ad6a5347769f49b3f3fa2b75f070d5e59444443f628a00a00cb7e9b6493cba470485201e36d9712a8d5c17cbdc1d67c650af58dce
-
Filesize
16KB
MD514eb2a1b0061d9b3749c48fbe7536e52
SHA198f451a5babb0f053cced819868fbba4092e85b0
SHA256617df142fe061bbdad4c34a7f4e624618b79338c154fb0869592c0cc719d13af
SHA5123b51422041c4e593af3adbbaaae51db45b0468de5f9f8b419dc78bea2f1ad0599dd2a11da64c5581a943ef57a19ad25ae8fb1f7e00b11ce254e7541c1ffd69b1
-
Filesize
276KB
MD579238bca11891830b767b00ee8bdeef6
SHA110dfafe5ec99e85c1e367da847721b106ff6b53b
SHA256a5455e1a4eac591d8fbbdf30bc682dea9708a2408d35d7464000ecae08e47ff6
SHA512249ea14305575ecb5c415e3969e21274453a70c0f5468bea52b4eb63d5b551c56630f7c59d1b45cf474fbc53a748c97d9afa8f51567df142098bf916973729a7