Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
276s -
max time network
276s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/10/2024, 01:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3diRTNQUXFSMUVBR0szYXZKd1FzS0VNTFcxUXxBQ3Jtc0tuM1NwcFl2UWt1U2EwSnZWeXdLTng4VFZ3dmdnZUtFaWowWkhXSjdxRllZak5CcFpZU1Fyb0FtRDdteGNJNldEQXg5RWM5Y0pyLVRXTS1JS2JDNkgzYXFERGJsUFpNcnpZTGNWVTNsaUhzeWlaT3B0RQ&q=https%3A%2F%2Friftmp.com%2F&v=QZMqVM9Zpgo
Resource
win11-20240802-en
General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3diRTNQUXFSMUVBR0szYXZKd1FzS0VNTFcxUXxBQ3Jtc0tuM1NwcFl2UWt1U2EwSnZWeXdLTng4VFZ3dmdnZUtFaWowWkhXSjdxRllZak5CcFpZU1Fyb0FtRDdteGNJNldEQXg5RWM5Y0pyLVRXTS1JS2JDNkgzYXFERGJsUFpNcnpZTGNWVTNsaUhzeWlaT3B0RQ&q=https%3A%2F%2Friftmp.com%2F&v=QZMqVM9Zpgo
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133723916161464350" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3007475212-2160282277-2943627620-1000\{713240B0-C759-43A5-8D8B-7EBE745DCF9F} chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 5004 4540 chrome.exe 78 PID 4540 wrote to memory of 5004 4540 chrome.exe 78 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 336 4540 chrome.exe 79 PID 4540 wrote to memory of 1180 4540 chrome.exe 80 PID 4540 wrote to memory of 1180 4540 chrome.exe 80 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81 PID 4540 wrote to memory of 3352 4540 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3diRTNQUXFSMUVBR0szYXZKd1FzS0VNTFcxUXxBQ3Jtc0tuM1NwcFl2UWt1U2EwSnZWeXdLTng4VFZ3dmdnZUtFaWowWkhXSjdxRllZak5CcFpZU1Fyb0FtRDdteGNJNldEQXg5RWM5Y0pyLVRXTS1JS2JDNkgzYXFERGJsUFpNcnpZTGNWVTNsaUhzeWlaT3B0RQ&q=https%3A%2F%2Friftmp.com%2F&v=QZMqVM9Zpgo1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b9b1cc40,0x7ff8b9b1cc4c,0x7ff8b9b1cc582⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1764,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1964 /prefetch:32⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2384 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4396,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=212,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3764 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4300,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3732 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4684,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=1068,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3432,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4876,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4968,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5052,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4928,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5336,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5280,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5304,i,7238842418472497524,1059365059049091611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Modifies registry class
PID:3884
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5e395471913234f9ae3a4f1525d0e0456
SHA12ed25795ec4172f20af73e457a57a4ca02dda6df
SHA256aef65fd1f87441454d858e55462d538d0644148b0c585e32556779bc5e30906f
SHA5120318544a848657d57fde33aa7af800e4f51ca0ba12aa5cbb5ddcca94d4a86ee80268aa747aa17d2749445453676d25573ff818633842a20384620aa825a5c845
-
Filesize
53KB
MD5d804e6372a58978ec09fbe1337081456
SHA11205a92649fa90b41eff2df0c11c73df3f7c5186
SHA2561eb7a9840572c74a236b70f85c0dcc10b6b497fdf98502dc5f47bb59252b5947
SHA512d6103da217755d9a31d06d902d2d5c7d59dbf6ad02b12b563c02a4a39d202821559dc3639fd37a0892ae124ce47430d742b02021072195722dd2d08c1d65e4fc
-
Filesize
33KB
MD5e2ec36d427fa4a992d76c0ee5e8dfd4d
SHA147ec4ace4851c6c3a4fe23ad2c842885f6d973f2
SHA25636488e81afcbc4d7018b8764c18032b10be21aa45521c9671fde0cc77f70b2d8
SHA512d1ae29d19f65ce74b9b480c82b87315634ec2e96d199f5feb423918af9ad6e24c8b436e03904d452f71562f04c42acbb250256eed73bcd592a79c08911c74976
-
Filesize
2KB
MD581ce9429715c5b246b9fd9215d0972ae
SHA10cd86efb859f7b3a3477783f0c26e1975e6cff64
SHA2567a305a01a0386c53f923427bcdae4deff5cdc503fbe92456d99d88b7a6a8daa6
SHA5121518454667016004c570f86d2844c055927969be6e69af63dd1c41bd8a0a1e3e16a62e6032ed2efbad5034ca3bbaa9775ae430afb8925b7841807501c11814aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\608f856e-f49d-4d00-86fd-4609e99881a4.tmp
Filesize1KB
MD546be679ec8b4423b58243cb2c03cd1a8
SHA1de6d1cd6e09a4dc71568bb60e482d02acb9d2bf3
SHA256939921241244032f3b1c027306a64380afce4ea30d43fc68935ff1b7b39ea922
SHA5125eb33ce580770d9b8e5d8b15917937b63561c4d07dc5c44e84f241eea3c6056e81b6a1978bbdad8aa21380f47b368eaa0b27ad59ba95a875d3cb1550956b48cd
-
Filesize
9KB
MD5070919832700862055b21d3bab0afe50
SHA11bba8a7cdb6d274e07e4d35f4455c07ca9662208
SHA256ba82a5fa0dbd34bc0ff387a0653436ee9a0dda7d386ee9387948ab11da9535e8
SHA51256fffce0298121ab4a101b491eec4c4d17555ad01707b4f15213af3add46c81ac2e9d2fc4e129de72947e738a8d9a702a872755e0e4712445562635f55b8c933
-
Filesize
1KB
MD5720694bc43300aa67673b477e9142a08
SHA1f01ab80680b32e5bd460bf810b2b76e3be273aef
SHA256408da1f1dd4e9d4d0a405e8422820eff2a8d28b68fa6cb44240c309a413ad949
SHA512af5d15ec318b20a2574927089364dfb0742894e29d1fa5de6fd5b552075b27a6d018ca286246ee415da5bc025308cb66c3628b13682c1cda488995365db84caa
-
Filesize
1KB
MD5519c77014f6bb4ab7dacd4a22ce4bed4
SHA1ee4c4b667231670707948a5219363966c519c624
SHA2564db3c6f2097ad736e8f82a234e59eed47145c186f56bbfcb6528426aa8d0c902
SHA512cb04b1e50891503ec36b0969dd826cba8b81ab2920294998cd4e456a21d7779d17e2fbc4ed4e79258f5c79a4f77285a39f09cec9192f39affb4c10c8ec864e1b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5c2935ca28fff33c9726ade8832bc243b
SHA1f6bfd35cee471f1b5aa6879b0ed8dd94ca8d2b88
SHA256f41bb8c06720d1014ac1e58372259be92c5651bf05070b84579fad19e325b5ad
SHA512803aea616e467fef651465579430094e2f7fedf924e00994795b0f62e497630704c84e494ff5a155b7fd56a8f7b4ed8a7cd4afd7fdd7177ca26ff889dbe2f092
-
Filesize
522B
MD5167f4d1aa0675096e211998fe6896bcd
SHA17749c9e9aac35f29eed5ca417b909d7207084a70
SHA256100f1733348775f8b8eb319d37b943d630da78eb9d294a32c63258625415f52d
SHA512ad8f43c9f5fad0eaa5302f25cf015d03acff8a830044b5bc5b64be792d4ff21e053d81dd88dac5bc58145dd6fb926a7bbca935d51dfe7c47242d0beab8b4d9ba
-
Filesize
2KB
MD5322699db7a1b468e678f6787c2755e89
SHA1321099f000e19308ac035c01b8345ffa662c244f
SHA2565d1b75864e4714efa8886c4bb3d1654043a6972c891829c12161025f48e27696
SHA51265ef57584bf16afba6e333e0c71ae35b718bf4a2b4f2f6f3271f06db96f89dc87912bcd37bd04ca116d160899fac04dd81c05debd291ced894ab7967000daa04
-
Filesize
3KB
MD51fa454f51576674a06c93fa5678a5120
SHA1e9dc1393bc399312eb0d43d08aae2e32073c1799
SHA2565c89282b026942a411e04b5b3628e9138f12c5e9d05e74862920dbedb63d9ee4
SHA5122c22e7047794b15c8e989b331b7ba498add2d8aa2fd49e07a69ee6fdaa9d8063bb2d333e093a13b38ee90a401672dee0e585a54a64f9389968a357e4fb370032
-
Filesize
10KB
MD51f99db164143d801b39ef0835b206e7f
SHA136a170e3d4bc7301a18f70aeb5805cda0bd76b21
SHA25657b93a54113016d4da2204b9a63af6b72e232b42466b2d2632be51de7d382339
SHA512fd0574083892973031c164068345055f7fe4e27e820f0bbdd6a8259811f844cca73caa98910d7bfead779723edd3c6f10a3c3c984016437305f5bd112f447049
-
Filesize
10KB
MD59c2f0bd34e326e63442fa8b27681ab2c
SHA1941232554a6d1d286ff4c0c59aa01451a3021b2b
SHA256b1c2a4e1bec4bc188b3efa1739507596a8f60abdb331a5e174a2debd728622b5
SHA512b67c785c0cd2a42848680c8f2560dd7196a10ad18e939260cf716168d3ea70585a92171c108ebd1fe5b0a2386f16716eda8c80c9f26def07b84febe3db94ee20
-
Filesize
10KB
MD57d4f1056059e65004ac906d2d585dc58
SHA1bf951ed38540b2b81a1149b07fcadb12a841ec8d
SHA25693a2089d499a915ea58599ef0b3afee6bf62e5cf843dcd7bd48251e13e1c58ca
SHA5122dd26a4eec34c76facb8e7211a78ef60ff7909d3a61cbff6aa62b9e0f530698b05b0c9f4b19f91232e9d1c2393eee5ede52fdebc5116635ae45f128051f06e45
-
Filesize
10KB
MD590e112d8260d32763a879215151aaa6d
SHA1ae9e66f1939b7ca6db13d86b4491acdf10dd4634
SHA2561ffa3e03014fd1319a49d546c67ba5835dc4f3ad28c323b8f3413ef4e5f739f4
SHA512eb313afaeb1cbe3c59bdd6518648207be113296461185082d9ad2651007cd24a996e91765e63af7e2be7183eaf9f1d2ec30c3b98726490d536670af518952b99
-
Filesize
9KB
MD5fca4386e82bf331e33721c688963dd67
SHA1df52cbc3cbc0aa14016a29375ae207d64bfd20c0
SHA256c615b807f20a8f7a797ef14fb2876d06784247e5222abc5f539f32a77861d83d
SHA5129f631f6fcce512c34097a2aec9ec65462f2173d440c4d94e94a46ba5b32ee41308613a9259576abbc090eb99d6816594351e61dd60cce4ee913823287889ae1b
-
Filesize
10KB
MD571d091f25aa4a9f5aac311de66cdc4a0
SHA1b9bc1c1f4a7216829c68aaee8ee92f6af1b1dc4c
SHA25647382c358f1712b7ef8ad4d5c6c8439f5c7d76b094744792de7c7e99e58ac014
SHA51257f07343ee568c9c0b52227e17dfa0762e2b02b28d7708c6688f69f44823f4d432ab4fdf1a32361579c5a60529e5a955d21e91a754c4ad8a19a7a97cf06746f8
-
Filesize
9KB
MD56e0d33954e8f383f85943eae50fa678b
SHA11b5afc8be11cea8e38a5246636d59b8b1657644e
SHA2568ff8cc7fcdb8364627c46733ea2a7a744cef078f4cb7ac007bcf0895e9faa5fe
SHA512ca9d3ed9e9b88b709631452650588937921a55f269580ddb0a5ac852cb0513df97c3de9f2b75c74b1204b8edc2a7fc58ca50cda7c1fc6a7b90c4f32643d2732e
-
Filesize
10KB
MD5a893577f0a80b82369927186e4b589d3
SHA15757070c150776c5df1084eafd088625468dc699
SHA256e1f55f4931bf9336bc32e9735c4fb15c9b325e4ba182d1eea41a930f4bf653dd
SHA51246a3bbea505c820536c689b91ef9e565b33725160038b06366b7e6d26441fd2968161b3dcf4a863e08679cb53de31265960b06af9f7ac78da55e362cdf8ad1ff
-
Filesize
10KB
MD535da2a19639e742058754103c09ed1ac
SHA18b7a7157d7b0fb51419be5fecb7c4a3692a34186
SHA25654e38026ec988920d140a3d6cfea651420d25153cb9eaeb869ba3e349929143a
SHA5128895654e9695255be90adc0b7db1a20d85a7ad0fcc7b51d0c372216786f7ccdc4aaf82e71f8edb804041a29f56fa4b45095eee4ad7490182b37dac1c2d1037e8
-
Filesize
10KB
MD5394104c3d7cfb2456ed3b10445bd4d4c
SHA1f4cd81f19f7e59a81014837bff312f9721f842a1
SHA256f5a767f61f9d0003230ee22fbb1aa9e632a2e5f4ca02f7308fc4701212d0407d
SHA51216545d9e3be5bd404b3e4fa927e500b7d7bebd341634d04f2f7215ea0c27e3611ac3d2d869cd5dffb1f015184fe20634c4d975f727dc826f7821c3f3f75b7291
-
Filesize
10KB
MD5a4a8cea3e199ea26ca2b1904f225d38d
SHA1abd3cacb3307967723cab41b52f576c7ea3c73d8
SHA256e089387634beb2f3358735a42c4d3401f89b5afd3cc0bc8c6c878fde655e4e62
SHA512907bbb78fc7aca191b66b06659c683057e44aca9f3886eb814fe0085e7bb842aeafc1b0ec32e27da3c0fcc1daab5092983d2a768572cb3fb4593214901a0b3ea
-
Filesize
10KB
MD53bee0aa02273a888917d1ec38331c508
SHA1c9c3bef9b7839f7080fe628c2b46bf7a43b23af1
SHA2566cbb38d78eb42551594945f0670d78eca7cdcf8c263343814af909500f0a3e87
SHA512a3b615879031f5ea14aa5071881219c96ce7a1ab06b976864bd8f40e525e7d3a1941ad5642ceec04f24b2a905a9967179f90b37456bef7e8760b726cdba4103f
-
Filesize
10KB
MD52b1cf6641755add272411b7b64bd95c0
SHA13ddf477243048fd57ac5102be17ef88ebf0fdf10
SHA256df64aa80399167b08e82d4ca4a2b94415ff7a9ffe799797338ec73f89f662ad6
SHA512eb48e386a435db5528996f61cc739f16bfad7ee7223336a310aa28662219830abdf18b80a6f951feca27e5f504c52df226f24c1366479097334d5c5d8fb4221b
-
Filesize
9KB
MD5f278330d6a9879a34f038575a3a5d5b3
SHA167f3ab2b2d0f08c59ed813d16765fa4dd8c31e28
SHA256d0fc2e5b64dfc9071aba1a77e452c953cf2eeb83af81731a0399ec76385c5392
SHA512ef82e62deb757a1d59a95b32ced2fa50aa461b9e8230d3fb92616f5ec92d09b476e691074ad1a6fea94169764f79cad06137d273f675c3c0d2f9b36461be1425
-
Filesize
10KB
MD5fc24d1f86e9346c0721edfd643159a6b
SHA1097e6eaf80e472b9d28df70d7eac4f9f04cd81a1
SHA256e1b0c408f94691c6e49b1a2c73c685b400090ed79e91f8f04d012a6ae774f110
SHA512577fdf40ed79f632d6bf8e86899f3b0ca164f6f313c15f3ccaf4fe35c4efc7e840b07e6ff66d251d2f7a714b66dc6428d06dbefc74d20c6a0944605a4ad4e191
-
Filesize
10KB
MD52701a1d12b257cfb2ceb0828d34ab8f9
SHA13c4fb54cca7cd9a4a54983050d1d3a3204fbc5bc
SHA256271e83f55362edc46a4a219e94036686c9ae6845875f78fe1a26dde1b6faabf4
SHA51242a7d68f13a32a83d0557d35eea9a99bb89c771dbdc72486eb8c90eb389650b42c6fe726c71c824d86978d9eee213a08ef2d18d23a2eabd0139b4640442a166d
-
Filesize
196KB
MD53b9e1b5b5d95f01e81096717e965ec08
SHA16fb2cef31671fe06cdc4934fe7f459924c8e8b23
SHA2569785da510425b400aff624187ed98477484a90e4ff4a452a397e55aa73cacc16
SHA512ceec564d9cd595d2c35edc5c37d83e456d77ddfe1812dd4a4fa56feed83a05e4ad09615fbf874ca64e41c2c85bf21eeebf7757e1fde7a919fb8e693061011135
-
Filesize
196KB
MD5b6c182de7e301a303829f44e691507d9
SHA1defd07b068016f4448f914bfeac2039a1d0105bf
SHA256d38fa0f14de2aade25d3ce7a6bc176b11dcd90b81823dc9ed6cd0ef455067644
SHA512cd17b5e566d358becbbed1ddd016d32d38e27105cd3802d4f59ce5665d37f67390846f1570a9f2bccfd70ca53ec2ab08c6d616fe4487042dc378aafa135d7c09
-
Filesize
196KB
MD586357b238917618ddaf1fdeb943a284b
SHA112806a9a1dd3960732ea597fb7b22f47ecd20935
SHA256a119c5ee30fca1c86d5ddfd8a6e4618a667e7baaec8df85d005f5eec7fade754
SHA51293ad7f14b482393c6853bfbe32f8c5b1b32a1c1eee61bf48a25e32e9deedda8c86838e74e5b0d6e6be191dcc509064a9ee375e366320d3d17c87c6a3a09b9c49
-
Filesize
197KB
MD5201c92ec4609457e9a98e7021d1dca8e
SHA1030db8f4f66b96abb27f0f3aac9ea551424f32d3
SHA256909eec32ee39994d9f58f8d5c128d6f0b7f37cc78519d7e7c264ce18de059d64
SHA5128410eb7b92d88d772bc1d534eac9f9e7fc6fd7e517523acc895be491a4292dfd009f9abeecd1b334115d8c47f35034c335f90c2019028e17ec6db1d834fb0797
-
Filesize
227KB
MD5d91f94f91e796f0381e68d4f48d37dd9
SHA126d622d4b250e1bcc0f3b5e7fce8fcab1f921004
SHA256d9a78df72933df0154cdce405361cc954b02a038bf72d3176d754e1a491d38c0
SHA512d322704fbaa725a0f7c28106b4df400752506c4f97ee10cb8093302ade7dc0db36b4843acc941e70768f67bee8a4457e1bb109a466ef9d62cde47d29c11fffae
-
Filesize
196KB
MD5f685adf895152f9973caa4f875ce0561
SHA1b2de096c5f4d6dbd2d1b3e9450a03b1974bc63b5
SHA2569ed6bdc413798aa9e0cd967334ff382118f6380a6b14e426da3e235eb187e9a9
SHA51282cdc545ef0308d063f2cc9f6961c52910ed154fa331a1acfa8c31fe48db7b9c8be1f08dd9b3bece1017ecff269d32e0a144d4fb122b61518d1b203d98bc1490
-
Filesize
197KB
MD574278b17fbc2ef8bee991e089fe4c63b
SHA1831dda6e2ce4ffc16c33b2930f9a87c5ff111590
SHA256cfc895660abca65f322de773c4b7c5565ccea75ed503b5711a8a18d796a1f19c
SHA51208777be99e99cb288d7f330ef1ae5d7e3245c22d9dcba472b0a09b5db1d8bf79c8460cf4994c18aed51ab792177e98bb5ff5fc2f307bec1679fa18220b9d4efe