Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 23:02
Behavioral task
behavioral1
Sample
Windows_Activation.exe
Resource
win10v2004-20221111-en
General
-
Target
Windows_Activation.exe
-
Size
5.8MB
-
MD5
3f624e8dfc6ad41b461d312c5f51aab6
-
SHA1
fd85d388800f203733a5a658af8a7eba4b4db918
-
SHA256
abad319211f4fbd5566a55b0822c4cd119f28f64c9acf67dae04a16c8bdb4230
-
SHA512
9f24f39f1db96ae2909d21636ecfd571c81d92c64da37102caae1563eb19f05e153e0e5874a62bb83c41471f653bd16ba59f5e6561ce3615b6adf4aa286bd625
-
SSDEEP
98304:/H8Efozb71QGQCPDbZfzuOqV6lXaNC51Bu3rqkVpKAzXlN3+5PL3F4Z8ve1ah18b:/HudQmRrdA6lXCy1ArqkVpKCX+PrF4ZY
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4716 Windows_Activation.exe 4716 Windows_Activation.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 4660 chrome.exe 4660 chrome.exe 3676 chrome.exe 3676 chrome.exe 4128 chrome.exe 4128 chrome.exe 4152 chrome.exe 4152 chrome.exe 3936 chrome.exe 3936 chrome.exe 4316 chrome.exe 4316 chrome.exe 3912 chrome.exe 3912 chrome.exe 1076 chrome.exe 1076 chrome.exe 4628 chrome.exe 4628 chrome.exe 3428 chrome.exe 3428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4716 5100 Windows_Activation.exe 82 PID 5100 wrote to memory of 4716 5100 Windows_Activation.exe 82 PID 1652 wrote to memory of 4656 1652 chrome.exe 92 PID 1652 wrote to memory of 4656 1652 chrome.exe 92 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 716 1652 chrome.exe 95 PID 1652 wrote to memory of 4684 1652 chrome.exe 96 PID 1652 wrote to memory of 4684 1652 chrome.exe 96 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97 PID 1652 wrote to memory of 3860 1652 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows_Activation.exe"C:\Users\Admin\AppData\Local\Temp\Windows_Activation.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Windows_Activation.exe"C:\Users\Admin\AppData\Local\Temp\Windows_Activation.exe"2⤵
- Loads dropped DLL
PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb6c884f50,0x7ffb6c884f60,0x7ffb6c884f702⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:22⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2276 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2940 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,13852579067796818513,15706479017761914737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6c884f50,0x7ffb6c884f60,0x7ffb6c884f702⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1624 /prefetch:22⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,17004656027009464822,4601122871131801201,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD513ee140d3fbdbfa1b149bedee8c79537
SHA1da770b1f8b8024e6afe6ebdb0ec70eefd89756cf
SHA256fa234ff7d82cbbd4fd290bb9d56438f5ab4771ac7ce47f293f0e3f442188d76c
SHA512c368340fbe46f9caf4fa707c184c92d619ffdbda47967c0c62cfb6384dcf245611d814509e113f86c94fa8f8a59f5029f97263574a450dcdf1c568a656f2f975
-
Filesize
44KB
MD5c902b75bef63a415771d5bfe9355abc7
SHA15ef5abdc5ed0a011989e73e4508e74dbd9690a0a
SHA2564f20e8468deb4833cfdbd31faff4c37d8139006c8a44eb0031c7697b516ed23d
SHA512fb1d33bbffd451b5c4393144f81b2cb6ebf03d02fcf1ad1ce2a7e3cc1ec7b5a3607d229624862dbb1c2f27e33e07bb16e5a442f1993d7203920f958dc3696474
-
Filesize
264KB
MD528f98de8e0af42cacabec88f610e4d73
SHA11e80ee34eaa602353e48fd2d3ded525a3826d1da
SHA256678241b6302d06d43e70151d12f19561c5bb9fbf11f443538ca6f75761c3fb73
SHA512db87b1c04bc8c4d058c0c8def6fb7243e9e61591ac602d9a638505eaa4a8e7bc6d0f959f3f1eddf390f190c20e4cee17ae7ff052ab726c249d17c521842fdd14
-
Filesize
1.0MB
MD5c7ecc23b13ad398e85d7b6687c35994b
SHA1ed257af1f235f6592031404115a6564bdb916d97
SHA2568a8472702ef7244b0443daf1d20196186652e1080dddc29e30cdd9d085873921
SHA51274e15bc0bd25d412ccc28e5c24c1221c5cf22e30ed860628ef8b932a4119f27a0fe6e9b8bff9e89dffeb51142081c0786a2b9fc0db4208c6522279b8f801f1a6
-
Filesize
4.0MB
MD570985bf81df117a51d75b4800dc70444
SHA1615c3dafdbd18b7dfe9c806026abafba5a4305bc
SHA256756cc0c9bee8d00526775dc01b851d52bfade0727cfd888baf46db04f31789dc
SHA512f18a1ddd43d4dd02b14cd1193b0b7d951afae7c33ea4cf35567c3161db7835df2e5ed8aabdb67033e00e36b5fa431a8220f11fb695aa7408d1305e5c79cf49f7
-
Filesize
37KB
MD5bb83faae2a3625220935757109b35839
SHA17a347a9c0f4a3e8deb45f316f172c60dd5be82ad
SHA256726ce62b1e5e5cbfa550e16da23fe3144861fd40cdf8e74cafc311034d1d86a9
SHA5126dd9b105c75512e8e724d36d7ab1ded4b08edd443da2ac663665ab25f2035af10637b7828970921f9d474b76aa436786f32b7aa33624c15b40084a1ae42e0d20
-
Filesize
144B
MD56856800eaa14003997b65f1b5dad0d4d
SHA1938cf63649782bc6995a5d0b9930fcd5cc991781
SHA2566834d6360c92676993ecd2669613435ba38207eb8bc4a5482ce6fe3762be1bf9
SHA51285225c2ad3d6fd59eca774ea993f8584cb202ccb04fc8fcdc33cf8a62a59f41173fb57cd8b523a151d20765ac5be184747edffa457e2e53dad342816a1799e53
-
Filesize
20KB
MD5339592ff2065e0cd87a29a6d4b238c27
SHA1c87a957077a01817c0d92f44d28df353e6e6bd10
SHA2567b7bab306aed4ef1c02ead8bba4ca99e3c193741538da74f4283b9dd1ddc91fc
SHA512eb5cf57d10b91f9d614178a5fb0d9276337cd1996712ad25e1b54758910ef64fe4ee955ecf9636e4db36df61bd2d7512dfc6b5a9cbe10c3ab47ff563acf713cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.50.1_0\_metadata\computed_hashes.json
Filesize3KB
MD563b1dbecf7a9105ad46c2b47719bc00f
SHA1da6b8deee6c07926222fb95e9e9a553fb7f4d580
SHA2567e717fd72cd44de71a90b7ef3dfca656c79b2c042ceec2a440f5c9a4077e5c4a
SHA512a50407695e5ff92354f39e2429520321cdf53c0e0051e3374e2ea57e29162c58abcec759f3f27566cc5f27c7bb204ec9842d9510f5a1454abad4f2faf657e50f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.50.1_0\_metadata\verified_contents.json
Filesize18KB
MD5028251a82adb37dfc63a1ad498d05595
SHA1ded46aafbaaa22feecd71909c3c2beca10f34834
SHA25693133177ae3466ace332167718a6b1b09aa06cfbd67323989ee3e6e81d3b378f
SHA5121a4ab74ea95ca70fb765b6e94ae22ecea63dc17d662c0d7faae0893a2834fd8ea1c7421c55be0d55653ebd604561ec1ae76e1c43243027e2003de8fd1cdc71ec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.50.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
264KB
MD51a20758abaed34116114989673e115af
SHA1a9d7ca249407dd8d1dfa870d1c116e455c2cf2ae
SHA256513043a07b0e0413bbfba84d6f2099a27e5b86848492ed29401487f19b20dccc
SHA51210d55236e8d55d3996173b610a07d99f99909b208a0d8383e7c3c138192fa75ff1c64da0959f57815fa12493bacf48f7facdc0f76fcefdb88e2616549166ba08
-
Filesize
116KB
MD56869e1f4ada44bcf50f534890fd35bee
SHA1b77261c45e8ec75af1b4302cadeaa44f1cc85c64
SHA256d7467ff4bda5f99d1562e5f3d2b3675203151edc5e21077911c7e55c2e658ee1
SHA512725fba01c74b2c3e4b9018eac417b5eba5616d5964dfc0c0d43ce6ead14f3bf447577173d7f1e1bf1be4d1a170d5faff7297f737de0e42fb1fd0a5232838bf18
-
Filesize
329B
MD53283edb9dca071c027c14a891e556cde
SHA1a1aceda4ef5e4f0acb99a0a2db43ea7d6a0009e4
SHA2562c7ba843577d62fae229012ecc81c91b348aacb5bc24ac04f04602c76de3a51f
SHA5128f7a2eb0b12139a0a1c3f158aac4fa6a22e49f4010992c8575f482d6d946663cde1939f809581b32ad808d573e7fb3a875fc24c79817f2c0d4ea0dfe2c54eb2e
-
Filesize
2KB
MD519b0b5f0fddbd450304eb7abcb63c689
SHA1153379b17045d286ff24436be62a2dd70c2b64ef
SHA256100d8826413a223e18ea772e58bca3b7c955d81f5075c666f130d7d00095bcec
SHA5125f380bcde75bba3b2d8b8832d99c891bc44c58865339fd8d63f2c7a293c498d9e9d0fafb4ebe25dfb97316768a779cceaf54ca2f23df602a88aa34efe33e6c90
-
Filesize
331B
MD5afaa5fdc1d888e1330402de67fd4cf44
SHA11effc9e15609db782fa1295a74063e76977fc630
SHA256ad715b9cb58e371246224f9b4e7479c5e8eba85b43809b47575bfd60e20d6b18
SHA512586ae9d5c7a311bfd13e0502cf8cc5020fa00d126d7528d840cd3c1da2e3a32c13b406e509b4b28379e6755054ee8aeb0a9a30b0152c2a82b8e3f63ce9b4b743
-
Filesize
6KB
MD522b1528666fc18f937d0479eea4beaff
SHA1230b3f49645efcf2eb448255ae43b908d70b3ba5
SHA256ddc53aba1e290e85cb2477d764dff0e6428866140deefd4ba265ace30d9c8102
SHA51243b488ab5f85448445be06391ce7b83a44d3c6bd13f21162f67ace1b0888abd6212b0b1491fa004ad46615898c3f4d67116b96d8814e6a5f16ae1a7007efe790
-
Filesize
36KB
MD5165185726b7a31abf112396506847e98
SHA19dd800cec3d3d36134c3086ab9b69795ff753261
SHA256fb33de1147fa001962776f690df67f4d7fd81f66dbcae85e9ec091b0a9842355
SHA512ecdc0fcece64b97cc59d64a710af591f9a04489d68d4556ff195e93162b22f6b1711b5720a1ca93711988a988b1aef6413e2292a79d77e41d8d5ba4830aa6ff2
-
Filesize
28KB
MD5f604fa82e6b51942b6b58d95100419c9
SHA1ce73550a04b54cc482ba30ea8f11dd2d4fcdcad5
SHA256d6fb96927022dc92f99c08af6db9fb43f4a18e1d63df42654915da2873cd5a87
SHA512f729de22e13644f64859d6fd4f68d191159965a12f91c8081afd5db39920c240320cb210d13aa593920fbf1068b838adbc8291387041e75c3a2b45ad938a7688
-
Filesize
213B
MD5046cc08d163fc4578cd1b77a5d0965ac
SHA192f503e605c30974baf385f1619f1269b81dec57
SHA256693a60684aa9ff4f01cb6027e9c938f4701c0c898afc224a0776cb1e18e87166
SHA512e8b1df36a237bcbbad897146ca247edf75466b2a4030fec620c46932b5c31137f2931cd2758534e4308aed3fb9cc40edf2d7646a38530bcc5e6d7069c19a3b1f
-
Filesize
317B
MD5f5686723fe3b6ae6b9fe7ea02954bcfd
SHA19dcba06de32586fa08643067a340eef8ff724041
SHA2564892729a007e2a3971401354d8a4584df1cec98fa3f29dd5d59d2ebb2e4542e5
SHA512796906288f22b593027d96db6e87559df44d9c07b26aca66a9981c6270178138f6bbb51aafc4e2b7b80e8943a6c88fbff0bddf204eb24e6408f9b03fc67fd6ea
-
Filesize
669B
MD5540535817a834497ed48bd4997466f01
SHA19931e1188b75f0c0a7600146c69bd7626a19e138
SHA256fe3253e0bec7fb0382453ecec88e145de6f57c3f62219a4c78be0119a3a5df3c
SHA512caf82757350fab1604800cf9e9d9b935b0e58a4f06d4c391f0023d841ab9c8d7db855f5df88fb45808a5795ca78b09cfa2961a840931e3cf76849f274f1dee01
-
Filesize
348B
MD5dccbeea59a43dc26c74f07715218fddf
SHA19abbd062810f863e11e28bf1c0752ff4964c6aaf
SHA256c2eaaf2f56a8a2e267a590dd81ca2699e7c59953bd6e338e8860a8b2c8433be7
SHA512298ae48720b5fa7ccbccefad2fb720f9a146aa5fac803ccfbb61f64ba13d637c4610f03f819193ed337138d4cf0bd99f976ff240721ce9aefe453967a90225bc
-
Filesize
160B
MD5de92ad90be6d3364745b2f73f4c3cf73
SHA19158681463bd30e5af4dda4baac81f93cedbda77
SHA2560025a3e0d3b834401b3b5f820e1991ef7e810d9a4b8b6b579e6301c94e7031a0
SHA5129e81cefc195439439f4b23ee7696309d7bc3c08e5b444d2abde26d2f12b2d3bcfd124fb9a2d40c6389e9f787741676fad366a2e9982674e7b931028c014d8a79
-
Filesize
324B
MD5201a8ff28547896c1a5d2c0f28337c15
SHA1fc80f9b667fb5abb1c89afd2159ee05f41ba45cb
SHA25669b3d04f1e9ff0f3346a1d19a806fb368f751a7a64b04d0c15bb171248ae5a16
SHA512f6fdc40d800e989dbfb0262b4bc1bc7c73042e575642651c2b774b3856aa67f113b896ede5e77e8f415521aaabcab9fc86ec5b9b5766205c500caed8e8faf89a
-
Filesize
704B
MD5a57b393c699f36be622201800ad6e3ff
SHA126b43c39a0bb0fee1ecb89ae725c0b03d53f0b5f
SHA2565b9e347e5c29080576f7021e2a439777c533128322bee6302ddc90e2e99aff5f
SHA512bf95474fb9591311a1bcde39f8742c64249d6a7f7cb1917ac04f42f326ec82c507e89605c3694e1b0fc094fe996ff440ca9966cf6a1c77f4ad79796473bdef21
-
Filesize
264KB
MD51b5ae5241819c683cecc2e1fe33fc101
SHA11d465d78544bf71b4acbece15a1dadd15fb67613
SHA256aaace1579f4a519ba5a306a8fce3427a430cc64a374be4d407213b0efb561529
SHA512e18302e95352a2a8d08fab3cc00d9045b3d1ac5bb3d82bd064a2cabaec9b6d622370f9d0d5e564f913c253edb5f7ead88fa4098625f7c4bad41c97b8aa2bb300
-
Filesize
13B
MD5b63048c4e7e52c52053d25da30d9c5ab
SHA1679a44d402f5ec24605719e06459f5a707989187
SHA256389caa40ea458e84bc624a9af1e0dec60fa652b2db2b81c09b1dfe22822cc3d1
SHA512e86c58c5a25e24f21ad79ed526a90c120a09c115f4820663bd2ebbc59e7bb1c4c418267eb77645522aa20b2c1b53fba8e31690db7bae9b21e4eff3db06316359
-
Filesize
107KB
MD52bf1217d186320705bda99bcbc60fcd4
SHA185db61f077652fd8358f312aa9106d58aa5bea21
SHA256b2b4ef47c2fe644a591daad6ed5aec2f155ee65ab731b6b767263ee07155aa5f
SHA5127ff272ccd6cd429ed71e1a81437acee7a7e26c09440f459ae19054ceaddbede2d3271d1a6045bfdf97474fa165b0a63c250f2fd2ef679865069a66816d742a1a
-
Filesize
264KB
MD559bb263ed99ee96f25006714b0b5f2c8
SHA1628fa603eb2867ea1d2611a318c14dac9516e7d0
SHA256439ca2942d103945feb6702f889adb39149a528277b0adb12aefa71cc9ade4bf
SHA512e1f2e45a978ab2fff3010f95e9a0c7fbe42c506bff7a1285d6d12bff0a9430bc40d5c0e9db97511ef31dfdb3a29e82d1305cdd57efb03084e8d4fad4c84d0cd9
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
1.0MB
MD5f463c6cac27950eb3d362503796b84b5
SHA16b6ee1e1e1b972663521636aed28687543b7a7b7
SHA25650f27429b55c7fd951318d28538d4430a0620c15791d1745d046d31d26c1830a
SHA51230a982ffe37418409de83811c89a2f71420cd56d1a24d85d8fb086eebca8cecc505ce4be5f543f06b92ed4f6e13b1d8e1d09a8a863365d1a220e0e016e802525
-
Filesize
4.3MB
MD554f8267c6c116d7240f8e8cd3b241cd9
SHA1907b965b6ce502dad59cde70e486eb28c5517b42
SHA256c30589187be320bc8e65177aeb8dc1d39957f7b7dcda4c13524dd7f436fb0948
SHA512f6c865c8276fe1a1a0f3267b89fb6745a3fc82972032280dce8869006feb2b168516e017241a0c82bdae0f321fab388523691769f09a502fc3bd530c1c4cacf1
-
Filesize
4.3MB
MD554f8267c6c116d7240f8e8cd3b241cd9
SHA1907b965b6ce502dad59cde70e486eb28c5517b42
SHA256c30589187be320bc8e65177aeb8dc1d39957f7b7dcda4c13524dd7f436fb0948
SHA512f6c865c8276fe1a1a0f3267b89fb6745a3fc82972032280dce8869006feb2b168516e017241a0c82bdae0f321fab388523691769f09a502fc3bd530c1c4cacf1
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84