Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/09/2023, 07:59
230901-jvhltsdd9v 305/05/2023, 10:28
230505-mhzalahd74 305/05/2023, 09:52
230505-lwdelshc74 805/05/2023, 09:08
230505-k3yhpahb74 604/05/2023, 13:39
230504-qybq1see31 328/04/2023, 09:25
230428-ldl9ssda66 328/04/2023, 08:54
230428-kt32tach67 3Analysis
-
max time kernel
908s -
max time network
1589s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/05/2023, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
download (44).jpg
Resource
win10-20230220-en
General
-
Target
download (44).jpg
-
Size
9KB
-
MD5
06e4c9387b3d8192100410f428e4f3ca
-
SHA1
4e24fa5418129fdf23bddecca7ecb697c256ae2d
-
SHA256
3c1ec2b81d4b0a36297045b5d3af462f04029d3ff0b6792293ca4c80dc151081
-
SHA512
c7d96e23e951f1da6490d54bcfa72bbddb7a43804ee7c45e2eb884c9ed9abc7676cddf45d4cb441f807c72dc333b68082101f21a293c407283de53acb175b12d
-
SSDEEP
192:EwerdH6sxlAAPTEsuimOxd+lIrmEmkJx8F:Ewepa9APTER/IrdJGF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133277585176455747" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: 33 4328 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4328 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2516 4260 chrome.exe 70 PID 4260 wrote to memory of 2516 4260 chrome.exe 70 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 2472 4260 chrome.exe 73 PID 4260 wrote to memory of 1308 4260 chrome.exe 72 PID 4260 wrote to memory of 1308 4260 chrome.exe 72 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74 PID 4260 wrote to memory of 4024 4260 chrome.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\download (44).jpg"1⤵PID:2080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9e2e89758,0x7ff9e2e89768,0x7ff9e2e897782⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1572 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:22⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2044 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4420 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4552 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4840 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4564 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4972 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4904 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3224 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4540 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4916 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5496 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3272 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3024 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=1124 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3776 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2512 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=2516 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5916 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5852 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6348 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3744 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=4560 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3212 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4444 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=5428 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2472 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4460 --field-trial-handle=1756,i,16482477189261963778,1461035024550482357,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4440
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5ce66c4cea0f0d529c3408f37026d4a30
SHA1ccb77de1ac04ef8e1b519e479f064c41e803950e
SHA25640f4b2aa8365af7428228a01ea3c685149ea3e18ca7a8f2780c1108e009f1b64
SHA512316ec8f9af698c0b5e3e6d8003468bf9d684b5a2d8d3e13d72c88e3f16e6594db27e1c4ecab4dc97d2638b8e8b7527527e8300c1c1134814c5aa5955849c8233
-
Filesize
37KB
MD5519005befdbc6eedc73862996b59a9f7
SHA1e9bad4dc75c55f583747dbc4abd80a95d5796528
SHA256603abe3532b1cc1eb1c3da44f3679804dd463d07d4430d55c630aba986b17c44
SHA512b210b12a78c6134d66b14f46f924ebc95328c10f92bfed22a361b2554eca21ee7892f7d9718ae7415074d753026682903beba2bd40b35a4eeb60bf186dcdf589
-
Filesize
17KB
MD5ba3ebb3e64e512410a15ad24c466e6fc
SHA1ca3b009502016d7790e70608c84c3ebad65ddbfd
SHA256bc21eb5ea92022cc0c1ece700f46a429966f6d598e7e887f2c4bbbf26d6bd6de
SHA51235e5c0096fe8ab7a0110fb7e823c03314b23376eae7101982c63cdc1221decfd1a045d9d6997e09f57ee1c42dcd3696efbc40176cb286ed71ce774d3396b5f6d
-
Filesize
1KB
MD59177ed73a37d219537472473ebeee143
SHA13117249638191eac646ec26d86c77ed85010504f
SHA256b022a442728f8040e3ea16f68bb53c2907a2bc33ae2e7616306ac394bae4b4f7
SHA512a1ec4cabe83292f2cce7ba94faa5badef9b865fa05df4b5b835f4a3db4b7e1b859b77c7568f34f7a9fcb9383956d85f6bffed1556c7ab3d52ed6d99f912239e8
-
Filesize
264KB
MD5bb47b6423c76524a0e98e289279d51e3
SHA1996e6c4a6ead571353d45b90525849fa902b7cf7
SHA256f11365c2b4a1eaa03e89578e6566f8df5a27aeee107abc812909295b7c5037ba
SHA512ac571dca86f6067ea9541398822811e497ded77e7cd418a8544e639f8c766904732fdf04fa6040b26e6fc4ba522345c9dd05e6d2f4e1571f30844d68b0149342
-
Filesize
6KB
MD50e31a3e8792e0b732ebe2dc6f31c1529
SHA13af9639a56d1dce598198383bed678b38b1b9d97
SHA256cdb53ae65567deea5cbadc1eace3bbb375ed00680c61a1e1b58f25a55681b227
SHA51234a661a4a7dad41aa3a9b8ea765fb0f4fc097be87dc6a64ce1525d7334656a2426006bcc1394b3dd38b7b6eb4d5dde4f4ce4616a40dd65fb69cdb5df4771ea86
-
Filesize
6KB
MD5ad64d55d6e817437439adcb731bbf63a
SHA1d3470a69cffb9d87c47cad14d3682bdd7f967a49
SHA256df832986251a8a5debe93e763a27b29ac5187798b03fa742f3e04f3748c64a05
SHA5126cb2132d9a9b6a1a10844d2b59794fc37e3c2929deec0059e1aaa017d0000dc586f83f7f8953c8e1f89b2a7562618f92af7c7509b721c2717a7e11568d15f781
-
Filesize
6KB
MD5def606e0f71de2ba5a53b4e602d8bff5
SHA154d88a3a398947c1243c4a3bdfae224318499e87
SHA256de62cdfb3367a4dcf4bba40b953cf368ecc6e5dd9bd589f7e3c8a93e508ca6ce
SHA5128f003a7e4c5aab855c6459ada3f6984f9f8acce8ed5c89b39a9f977ee6b36594c45298fb59e3c76695ca43fe646b5518665dba73540f7cb89d00f8493b8d0687
-
Filesize
1KB
MD5f48447dc5da458aa9a7649860d8b6e21
SHA13fb8eca1a5f547c71ec62798f72727d9fbf6c688
SHA25627de2c689b256a5f0f82be9025bd99b66b3deadfb19bf8bd621b459958c34e19
SHA5128df3f2b5d9ec5471586c465713431cf5f667b72941ed6519787cad6a188c5c80a0248afd605ead4df7d9e05e8ea9613ca471ee349312b2a999d52dbb94177dfe
-
Filesize
1KB
MD553c6b092d82bbd1b12bf242ab304f842
SHA177599e75f76279ba1f9c7df20a09b207085a149e
SHA256ce960a5ff796516dad500020f211219a8a6d08587d2b505856a18af11fb87d95
SHA51289c82bd423a83bed632b5fbc847e03ee646f618db18252af303fc4ee8ade897cf3168b961dceaeeefd51437d7607e6a0746ac65999bc1a4db85e58d3e67a0dc1
-
Filesize
369B
MD5317c919797d0f8f7e64af2ee306abdfa
SHA12528875b9e4541edf71eff4b9e01e18f0d27bb98
SHA256dca7d34201882ebcb0f9877371b1150a1cf30a1826ec21e92c44ce31c1d0658b
SHA512225ab99ff7b4a681f3e41bc4e9a46f59d70c05d0fb245eb68b50d6dc2376b044eefc1775b2547278e72f2c7095f690676a43d2bcf68c5fc460c41f6a96124673
-
Filesize
1KB
MD5a7b53284fa61a2643a940cb838941386
SHA1e142ca3519a0d81809ee5011055546952957c516
SHA256dbe20f564c40a467b11dd25501ca728e07899f811bb7ad2afcf0954cb55312ae
SHA51215ac223b379194ca04db27e35c5891749b76d6c250fed6ea3f6ffddac5ddc6eb49816fbb885d700f6aeab2d8b2f89883df21724b838b5da90dadffd14eef8634
-
Filesize
1KB
MD5b5e44a8057fbbfcbd1988ba9fed8feee
SHA1041396458a1a0b398a2caa77938f5ee3bc5c41f8
SHA25636e83214d7265f525cb42642abf17ddd7c933426f96938a453610b2e129926d3
SHA5122265e03ab97d7e6b92a92d5cafeafe9d66366a8f4625f1da2796a8bc2f3f9343ee384018d0146150408fb6e9a9e4cee2ad717648ee2379d1c9fea9e8e93b0e85
-
Filesize
6KB
MD5ab81dc5ae9280bc22ef722381c8474c2
SHA12627d70e2223cadbd2ec511edae960c3c754c7c6
SHA256054ad61742b8df7234c5a27adfc1bd0613955997c74e6de12f324281797d688e
SHA512b752535613fb060b6cd5bad72f25dde17ce41503d548aa9ce55144f6c5bf9ec970ed38c93103624c03617fcdde1351b393828c5eb6c821ef32662b145cc5f84c
-
Filesize
6KB
MD59aefb6a4a5c529518cfc319dd334d5aa
SHA16538150b2c5173b03ee63cfeb48cf41b550e1501
SHA2566258a20ef502c8232e588a484869124d06e08f19b77d9842691ee8b345fe893f
SHA51245baecd8a619d017431f7fa72238a70708424183881ac67df6da77b0ce1641b21ce8a5336be03cf04d8ac0386574beac3caffeff4e503f7549d6da945c9ef282
-
Filesize
6KB
MD500a72038cf7bb4d5cce23c82e995250d
SHA10a8746a71d9f703849d5416c648cf7dec4d25deb
SHA25681616e6447e04dfdada02f5ade168815b435c09beac6b159aec59016e658d299
SHA5122035b2063d4172625c1cf32eee9a0bbb2b556190290ff575771d4faca6bf28300963a96cf55d5f09d3e1f120b9ec33560a3dbcc3a30e6666d46e30a883a763fd
-
Filesize
6KB
MD51e5ea20709532752b815b4b464b6cad2
SHA10cd7b81ffd2d6eac1023c2d01389ff59005a1bf2
SHA256f750da047844deaab23078a59d21db514bb2341c50ae43e23d68607d6e196a5f
SHA512b9f661f674d09c019ccba2b37ce56d35b81dcb668cd9e77351a3228fbc3e08dbdfaed1cd38a05448a28c2acd1a67e192f011d8c01969f96547f62971e755a04f
-
Filesize
47KB
MD56d8e9de4e9fbae9af6285fb744e7092d
SHA100c05339cdf935d67fd257ad3168d2428dc978d4
SHA25631c7d4e0455684778e53f284f2269d4a4c9393545b7de7c0bdba00c262f5d201
SHA5123ded69c88f5309b02bd11b2f84f034b85a50651006498bf8797560034a9d184e5416f1a66c2fe97e22d87805bd394d7cd853e5643d66b41dcb42f05d91e86f31
-
Filesize
12KB
MD5319c17dac8f9dda505995ae6bddbe1d5
SHA1371a96e0c6d241e7013d2e30881c0321faf0ec7f
SHA25644c6f9724e1770cfe37d0d3bd91ecd4962123d1870fb383b3f95a8d103240876
SHA512b5be4f45283c0fb5800d38cf57fde19cfb4123441a2d1acb38e17623e5c56d98515d6887f118db09cff0499fca6bae6067e0b8c80e771be04d06cdba9b26ae7e
-
Filesize
148KB
MD560a65b0c44249a1ccd54bef4239b65ec
SHA11a04813543143b4c5f64ba29553f787b13fc5005
SHA256a14cd0c3c87f4ae0242f62c12c291e890a4d2c3c24ab2ebf3595822efe9031fc
SHA512b7b32d034c5a69580d39744e59c8e11e03bb42f0b9e6c601460dfca500e64734a9fe2afc886688b53d64145e330211b90a6bf9c94752fcfa1fb47c24def8660a
-
Filesize
148KB
MD5158f8178e39ef7345ea8ec457cdc08fe
SHA1feea61d39b96447b0c265eb10161280f716be0f0
SHA256d532b7ca991d2080f943a611de66a0edd4ed1070852fab1f8b995f14c944ac8c
SHA512ae559c2792575801fb5f77073d01256bd5079f8a3c4b1bcb8de30ea9455d1bf655567074deaebb7fcf0d29b0bcc7098cf3ac9988a3d84e04afb04d861e315ce6
-
Filesize
148KB
MD55b875a09850ee311705bad1a39c92686
SHA14ccd8e0e1a479051448c8dd33ac9ac7eded0cfcc
SHA256339951a120e95a52da4a60482b287ae58303ed072bcc41b223acce6ac1a9a36a
SHA512db2ddc8cb2a1c65d3ae958983c1c6baac7198746bf9167d2e25c5b8a9dd6326127fc12c439c2b909d808e0b4a2b4378b90749d69f0d466a101f0109930e7b64b
-
Filesize
148KB
MD500de7942f2bb397f6c7294a7744fa631
SHA1d99d09db188fe9b2adeda0f16c4799c0f27d790c
SHA256a681dc70627491501bde03e9bb07229aa087410c07562b6311c1b303c25de4f4
SHA51299cfddae1bedd85d3697bfe82d02a6ae02bb3b182b8d0d06423c6949b41ca202e227a2dec3aec81e5ab36216cb0edc5a07affa075dd711675fc87836c99d7325
-
Filesize
148KB
MD5d2f16f1671d892fb404c51bb47e71db8
SHA11f3d056a7c68ecf086773aea2f940bc117e1dd2a
SHA256d7fb8f0e844611ff68dd7130bffac28335ed7773ae2878f8efffa7c64ef05170
SHA51267ca68015387d6ad547655d6935caddf511e5e7930d0316b9a0749509fe78844d033b5c7dfb5ff9bef3543a5eb016c6435378177244dd1fcfaf70e7189e4f0d8
-
Filesize
148KB
MD53896abdf997ae39329e471bdb4a1b892
SHA117675ca787affc0a925e23e16cd20c2554f4e865
SHA2565af7bef71c6584997cbe61d093935348691616ab67ef86a1ad9663afebe99195
SHA512171a980bce31c1274985e1b091e83f653af1a76b61bb3bfba365678ca97ed08fdf9d52cbcc9009bf24e46bb6025eafa1ac886aa642a997dd149338a813eeadf1
-
Filesize
100KB
MD59e227b98d0d68d49d79642afc5cfdd01
SHA1591c6df776275d7633bd77d409b9e030d9f889e5
SHA256fb640633cca757a23ecde9a8a6b75cc704aafb8516bdcbf9631fddc242d9132f
SHA51257c0e0cb0e12fd11a5f46a8c1b3a77b9e423619692876f4a9b42416f58564fead984f954b26bcdec40b977b6457a9ac9cb07e7e0b90a8f93d83d930aeb2187a6
-
Filesize
101KB
MD54fcc4ec4907c3e15b2fd7e3e6e083e6a
SHA190ac0371a8231b24ecb55a09cbbfef974174027e
SHA2562007b89355653e01912af46a4e1a7b49a730fa785bec99ba86e25dbeeef87c7c
SHA51215ea0d39ef65b39eb0821ce027eda67117b3202eab49983f957f07a62884d9705aa66248cd6f0d49bdab35741da7b2211a1061d872cf5c6dd205749bb4545ee5
-
Filesize
105KB
MD5ac6c01b2b74a56f92723a2a0d2ecfe72
SHA16e1bef6593a16aeac576d65abc644cdff775f0f5
SHA25665a9afda3232aada1aa059ad4e1de0fbc098a218429d6b1ec4f58fee0f6e093a
SHA5125b9e875fba5ffc4eeeba9849aad40caece21bf6e94092da895a5d08875b1840b817a1e50a01ebc00b036b9d9e166916d90a29a7703076a3fc288ed7049f397da
-
Filesize
93KB
MD5c3f075f1053afe0cf7cc755a2e228845
SHA1b6ea389c766c25b259df870858cbe890a0c4ece5
SHA256425ac292d4ab19046bfa47b7f5dec6391abacd74810d2949a7397b1bb20c1188
SHA5121635faab309ebf71ae90605eb361214816a628218e8645676351f6508721b376e462b40a7fc26aec3470b86c5b5aebac82b799d199ae73726e3f4a7e72a6e36f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize8KB
MD5a4bb48dd7dfb049d471070e5e4286679
SHA1bafe08d476c682f4fbf3d518ded2421bdf39c9e5
SHA256eaa93d3cb474ee0ff4d0561bb0473659879a2dfa91d804fe9c2034af8d77ffb1
SHA512434edd9e2cbe1227c99b9034177cc03289725dd70af0ea80c81ca2b2daaa023f8590fcf2e0569754df178346ba2da3e9f82c34b783b2a394d7c7a52ee9cad839
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize7KB
MD554b4e3f74afb6cecc1bf039658e0eb8c
SHA1a7bc6ab9b87724a2eedebf68373b2fcd428bc179
SHA25603e0796aec131a0175a13cc5390cfb7a430212191dd77d92e857193e60b79f58
SHA512177900470e9a3b2b904fb164f26cf49660c85ad3b8313c7fb1794355ece9ad583f8879a93b21a53b17158050624947c8a4d08bd5bde43c5cad58c9f19344e946