Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
44s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/07/2024, 13:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1257760500733837394/1257820675440250971/C2loader.exe?ex=6686750a&is=6685238a&hm=43fb8cea333e042947995b588cab4bb977286323de0ade2b64879446dd0913fd&
Resource
win11-20240508-en
General
-
Target
https://cdn.discordapp.com/attachments/1257760500733837394/1257820675440250971/C2loader.exe?ex=6686750a&is=6685238a&hm=43fb8cea333e042947995b588cab4bb977286323de0ade2b64879446dd0913fd&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133644878436856536" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2124 1548 chrome.exe 77 PID 1548 wrote to memory of 2124 1548 chrome.exe 77 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 1504 1548 chrome.exe 78 PID 1548 wrote to memory of 3044 1548 chrome.exe 79 PID 1548 wrote to memory of 3044 1548 chrome.exe 79 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80 PID 1548 wrote to memory of 1784 1548 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1257760500733837394/1257820675440250971/C2loader.exe?ex=6686750a&is=6685238a&hm=43fb8cea333e042947995b588cab4bb977286323de0ade2b64879446dd0913fd&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff3311ab58,0x7fff3311ab68,0x7fff3311ab782⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:22⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4692 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4564 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4676 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4568 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5096 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5040 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4712 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4736 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4936 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3356 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4980 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4708 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3348 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4928 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=2244 --field-trial-handle=1256,i,12118021238127312687,13840135762158356640,131072 /prefetch:12⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5f26c19f809ae13fa0ed83ee169d55d9b
SHA14fca098f425a10cd9d383b361e7e184576c0f112
SHA25681af9bcd0666ddcaa31c10a647999d54b929c5376460d1d692bb552098ebf667
SHA5127b1925c4c0c91cfb8a5782b3b4af913e3d9b7a4d579b6a95a70c10176fca7ff80fa1a074d0b4404a671e0d155f59e0fa2b0a6c33777cd023b145a63f25f82531
-
Filesize
7KB
MD55279a8fd21b94e11e385c271dfc21aa1
SHA12c480bc2b9e325b64d88d18cfdcd226080295e65
SHA256256dda3db32b67379359d0ed9e8fe5f6389efa2ec22865feb2a00ea4d1b6e8b0
SHA512dd2babb580e0c16de8b1ba2e341c9eeb24f0802747d1b3c4df7315b0f5fe437bd04c416a5027500e3b6544ca7926d632097121a00be0ef6ad62e03bfa3cc4766
-
Filesize
131KB
MD59858f732e1761d0a6706c2008a9540c5
SHA1b23659ed99d08866b5d157387cfcedf27ebaef66
SHA256d1d949d51dd7982e2af6dfda68b5e8a0869e54c15c8bb4b70fefc8e054c67bfd
SHA512ffd12c5723ca176a9f16fee6f65c9978e6a0f48812b5c087adc2069c90fe6ed319abde349a4564da27ce7b7e280e8a1e14db23b0e733e1e8ac8628df9fabc7a1
-
Filesize
131KB
MD5d0110ab04d4d883b33b23690d25393d9
SHA1607e79b271bc39277882f23c7fbf7fc6aecee2b5
SHA2563b37267c8b2071894a36f3ab79a979c96c454c2ee384bc56c76fd07faa2d9cab
SHA512f8c7470158e7af5a77aba685e59bf7dc5d47eb6e7ea37f589901a2ab8bdab845f34a0fbf4edcbac92dd4bd78b7d2be06f61583de92e15ce46159cc6b65df8432
-
Filesize
87KB
MD5f65a38c812fa427225e51ec2d9b70a06
SHA19e582b7285948af17c63f3ea5392445690f52576
SHA256ec9aa746c6f114e3d49f64c72a8827711db748514c49635b5b4eed6d2f281b7a
SHA51298c39c1a2767b7884a53332ef0037497cb7f55dda0bccedf373b28fb230d7efa86d1524a2f65241924c85db496edafbedf452ab160310502d6e037728a5f0061
-
Filesize
82KB
MD56523510ead4ecc48cefb0f6350a607f1
SHA15e6c6fa887a157ff0a468af2f210326f215d18da
SHA256b7b5566cc4a21b234bed8bfddc754e4b93cb8502f9e6e29c60ed1d2f1809517f
SHA51282bb9556e3f78dac01bd3b6c59354d4962f01e37fa1fb52aaf211f94688d171c0b911ddcd8b38f0b57c09467859b01d1049204e4fb3a1e473943737fcac5bfeb