Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 12:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mindbodygreen.com/
Resource
win10v2004-20240709-en
General
-
Target
https://www.mindbodygreen.com/
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661244657668624" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 540 chrome.exe 540 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 38 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 2992 540 chrome.exe 84 PID 540 wrote to memory of 2992 540 chrome.exe 84 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 2716 540 chrome.exe 85 PID 540 wrote to memory of 1808 540 chrome.exe 86 PID 540 wrote to memory of 1808 540 chrome.exe 86 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87 PID 540 wrote to memory of 2892 540 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mindbodygreen.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaef61cc40,0x7ffaef61cc4c,0x7ffaef61cc582⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2260 /prefetch:32⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2124,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4628,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5104,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4756,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3812,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4800,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5108,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5496,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5508,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5676,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5976,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4416,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5272,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:5224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4404,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4604,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:5336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6280,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6644,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6604 /prefetch:12⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6792,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6768 /prefetch:12⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6776,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6928 /prefetch:12⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6784,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6912 /prefetch:12⤵PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=7072,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6908 /prefetch:12⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=7220,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7328 /prefetch:12⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=7076,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7524 /prefetch:12⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6152,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7640 /prefetch:12⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6108,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7812 /prefetch:12⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=7900,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7788 /prefetch:12⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=8064,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=8100 /prefetch:12⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=8048,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=8068 /prefetch:12⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6580,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=8400 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=6156,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7800 /prefetch:12⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=7764,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7896 /prefetch:12⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=6896,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7396 /prefetch:12⤵PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=7048,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6868 /prefetch:12⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=7180,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7880 /prefetch:12⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=7164,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:5368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=6160,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=8576 /prefetch:12⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=7628,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7612 /prefetch:12⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=8384,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=992,i,3509551037958926049,5434617765508109123,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6748 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53354b6726340ed4ed207cd1fe478f8ea
SHA1936fcb0c8336c06f0216b5dfd124003159fef06c
SHA256a77359282f39a77ccecc13451fb3938c5efa90349bc05dee684ec4715d961b5c
SHA512e71a11ec3662f0eda26654753075aa17b78cbc44d4db7ea663fb87904c5fd065f935021f06e62eff16e5898fd35e4b85515d0fe6a31720cdbc509d8853bb2516
-
Filesize
1KB
MD592eb0e9d7d8409812585ace54fb4710e
SHA1c02516d6ce50c7103653bda0c1f6925ae1574af1
SHA256220414017fda081c43a0f603f8dd896b0cdd53c3fb0bc08a336b7be590b07f2c
SHA5125c37408ecf3862414c031022837a343a081ad1f817b629c1b8e9e3ffdbb957691d54cbbfab0c6ae66f6249bd55555cddff1a4f0d3dfea5c5d2fb02f033ab565a
-
Filesize
23KB
MD5abb906359e5b0924117170ed869911bb
SHA1c2b0edb2dbb150aa8088b49d2cea9d03104e18fb
SHA256e44551746a3b7e9be8363f49a14f84876bbe3ee98b019eedd8783a692b73768d
SHA512be2f6af22648a5ba65bc16545905ee5d043b555eaefbbfdf541d781ed901a7d1d9a94bd103745d136eaa867dcc4f7257cb105b01489694a81c7a70bd06b62cf8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD51b777bc3c0fcde1d5f86cfa91bc57554
SHA1ad0488fe3f4a9cce13aa89c9d399076352627f45
SHA256e8f47005fc7dbb4723737c47f75356b12406c08c4e6ec9e983e4acab316dfa57
SHA51287346c22f1bc9070bce45c008cb38645142d3f19ff08ab0cd10f31411bb6aa9046c354c3e60295fa13d335392bdc2048bc4bbe160678fb19899b7c5dc12a102a
-
Filesize
5KB
MD5b465b1d1590c22252b2167a28b5716f1
SHA11f7618aa125105e11354d7589c665dc7d75b6947
SHA256c7ab47003e48056e65c9dc68b9e6e79d26d1ed9466794c1be5b1210a4426e8cf
SHA5124c3f0d05040fd173b4fa0635080ca2a311b7c41ab023d9b4b25aa8ad3862022350d1b770a95c70d32a0edde2f5fff9818c0e866f13176bb3162028b9e3a2b8ae
-
Filesize
4KB
MD57942d8814ebc0aee6ab321768b0acdc7
SHA1755a781a7cf27ed45dea5a01f38cc86fbc74d991
SHA256a79ff145fe9b215671bc693b8b09d807f930d0020e4f9218c484841c41efee30
SHA5124a605d6e8f5f42685ddbb52ee4adf2ce8d65e7f55f4021ab5aba6422385bcee23588d2660d8c9c84c4bb5a59934743c8f81723f144c8ddd6da606b604afdf175
-
Filesize
10KB
MD5614fd0024e0147f109080ed911ad4ed2
SHA1ce8f3fb5fe352f374c77058aebb2b4fa3b6a6345
SHA256e0d70ade89cb18a13f5981cd0d7d2c2141529c34ee75e76cfacfa62657d1563e
SHA512635597e862b003e3bbcb052d22509264fb624fe9aa29386252fc36c0b716d3166b43ea8423947fb1c1d2e3d6a745700881aad88df571801ec33e73ecd3a74938
-
Filesize
9KB
MD5dae2a22b39b1febe4a67e7862326f889
SHA1b19e9933c869893f9126de4315b21cbdd557ef55
SHA256e59c145ed252a86a36ce7c298037893504a48f06e7227e5862f7b95364d9ea4d
SHA51206b36cbe5ce057dfe96b44e9ff7896c5d418a7a737278405eb378eb559caf0478652f8f68793b50c0a543017210488b6cba34dc3e9551660ab2e41bb26878a04
-
Filesize
9KB
MD5ed04199c166946d38266ed6f69ec8e3b
SHA18f2cbb9ea26cc1775e17a0fc191d4d310afd9cbe
SHA2566c34e5aa3370370359e68199696f482486553051fefec466126faa16388c31e7
SHA5121829562e657844af76eb1d7708532affc5d0b7313ac0e610109b65e703a5ed6699c5b8d48f719d5c69b033d98629ea324a895afb8cea9b0bb199534433181e26
-
Filesize
10KB
MD5d7f54ae33614da3e5ba13d9e0fd35b7e
SHA1beaa631bd008782ce50c274b490d9d6d7a1930ac
SHA2566c0283fcf057ee25dfb3e930b9df1f90a596830a9cdad7692727d2fc6ac842f1
SHA512b155e3da406ca540c5b6b28969bc783eac6735873219368365f24360d3a1a344b351982d53d21596fb9210a93207ddf032696ae4adbdfd18f5e8287359a05b01
-
Filesize
9KB
MD5a69c52d0ec097619a3852b98f166e67b
SHA1a1cf585cd207643a6d4c512cd9cc0d6dc5465b02
SHA2563dce7e428664781084ce0156db93eb1fc3d84b42c8efaeca50eedd3e26cdadb1
SHA512d5dcd8d84be7c46657c91b38e733dec1288d95ce8a215a78cddbafea80a8f1d77cf11fc8416ffb92c2eb7e2b7e5ac4de53e055fa1e03175c09007728e14d0116
-
Filesize
10KB
MD54f5f399177be9226774bbf58b9bbe8f3
SHA1cdb5d7d0b621331301e8756f2396e776a95cdb19
SHA25663f0e2889de0cb92ddbc9db08104525799ad22122dad852d9df64aa2b47796c9
SHA512b7d83ff8790f89f921349e7d42468b216421a3ce13fa9f6615e0e1173a9d6deb91bc24e5ed91eefa4c0f337c4e130a5907cce605b2c81096729fcd98eed9e124
-
Filesize
9KB
MD586de1cae19a2477cf255337db4538023
SHA1285756e8ef1c14704ef2ab61c18b6d586ce6e567
SHA256e17b1a7924392edc8182505fdf72d35ae1dcd7fee8588e09ef4aec011bcd98b4
SHA512bae5e859ad77ffad9f7e7928d3d787a84047a3fb2776d2644b2802416847426a3d8e9672a9ab9e8c4f1f8dcd360952a21b1fd3074b470a66fed5d4977f42e158
-
Filesize
10KB
MD5b4e578320800b97834795aa6a0d65dc7
SHA1fa052b0eb6f699398e2163bd8ac694d195346c83
SHA2567f22b2ca4e0b37b346d43c18e9c829c1924193dcfc6ac3bb6416957801d82010
SHA5127340316507c5ad15ce7d288cd26f68e1bd6d12dc015280460632d58f572766a1d4cbd8178142416e47824ce042de9c3ce68c7a770051250c05c199348bf0b4f1
-
Filesize
10KB
MD55549664fa1c0786acbd3fa63d87236af
SHA1715e79d6c224df3be48a7156c46dfd3aaf5f3a0e
SHA256a6817b9445c3037bb71ed1e4c0c92665902d198f20e28b30a1db5442f529270d
SHA5128032361ea29b45fbdb7409ffd2354a428ef48245df99ab1cac4d017d281fed2d3f5911735baab326298d44f4f8fdbd628e7515d9b18400b03915f926c5d9d8b0
-
Filesize
10KB
MD5b5a29167ea56fba0a6cc553b9c8d2f0d
SHA1e8cf23e16dc113935b4062d4b9a8f05b3e5b038c
SHA2565513cb02bd3506450a699c2d940825cf232daf576922571cbea8acaeeffe01c9
SHA51282e506a9031e4b1fed851d9ec6962cab88b75662886cd65a6179b70954a63be18ae0bc35ffa152f9546059b8cc354e999a60a3fd878d8a5a21169a9d017e916c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b50183211d716a41bcb013631b78f977aa0eaf8b\index.txt
Filesize125B
MD5d3332ce5312baaad75016fd79e9d27cb
SHA14fb5b0aa0b9ee6c799207db703ad0f6853a44898
SHA256ebb49cf8e75eef0dcb94a63535ead0585bc2bc4d4aa94f168e2970a273ada52f
SHA5120810324a9054e8606ce5a85e0b0b8e56b80d75791d9c15f0d88cd0c6453aebdc38c9edce5f4d85b7ffcef6b74be0ffb6db63fb9ba52a36e3fc14f782fbf35d95
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b50183211d716a41bcb013631b78f977aa0eaf8b\index.txt~RFe581a0b.TMP
Filesize132B
MD5adff438d84255b179442169736956274
SHA1aee23e344eea54f3e502e178ed869886be93fab0
SHA256dddfdfcebe1411514ea9b2d1e56c40abe84c56a1bb06a308311aefe2d691fb76
SHA51210c0906a0d8b9b43391890488709472608e33a0823febb1aa50fb4ed3765f7e75ae15c7690f9a4cb6947648f8b488aebabd3d449d8343480adab545bac59dc3f
-
Filesize
181KB
MD573c6e8cee5af96d0d969bff0331965d0
SHA10bbf4c0ef615cb4999ab46ee890d585964100a4a
SHA256517a84f9439673cc44d9e6bc966841f5adac0f1f6e32e3b6c1956d2ec8c50a55
SHA5122da3760f2a412c82a0a25bca2419288b88accc9f831fe7ee9b452b1c6045b5ba3f8a5b689dfaf449a2a57c564dbc01f3b0879bd17cf8404930f7e95dfcd9a1de
-
Filesize
181KB
MD51bc4ad69fd2ccc839b2e1ac4e2d3a096
SHA1b98838c310bb4ea47da6f6d6bf071cd32627ee65
SHA25607f9fa29d11bb6f9456e903da8fd91ed78c845a9125cc1496bb87e9325f470a0
SHA512da453e5ce7c039308a5038e42bb82dcdb8f0e5cccd0d63e89a18ce02484a5c87fec72bf460a8656bae3a4929ec899a76cd1d76c0522405f8bb631ae3d3c85fdd