Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/05/2023, 22:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://nigger
Resource
win10-20230220-en
General
-
Target
http://nigger
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri notepad.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294466998315280" chrome.exe -
Modifies registry class 57 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe110000005bb798975945d90143aa179a5945d9018fbf0b9a5945d90114000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeCreatePagefilePrivilege 2008 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4384 notepad.exe 4384 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2040 2008 chrome.exe 66 PID 2008 wrote to memory of 2040 2008 chrome.exe 66 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 2980 2008 chrome.exe 70 PID 2008 wrote to memory of 4144 2008 chrome.exe 71 PID 2008 wrote to memory of 4144 2008 chrome.exe 71 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72 PID 2008 wrote to memory of 1904 2008 chrome.exe 72
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://nigger1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff954c69758,0x7ff954c69768,0x7ff954c697782⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:82⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2036 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2740 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:12⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2748 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:12⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4304 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2796 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:12⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4976 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1736,i,5239594363176654340,11377314348767841490,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4724
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\ee.bat" "1⤵PID:4228
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2540
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3264
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:3704
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4248
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4780
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3144
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:3408
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5004
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:916
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:320
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:1096
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4972
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2120
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4768
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4356
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:948
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:652
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1968
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4708
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4900
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5076
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5068
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2072
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3728
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:3816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3936
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:3880
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3892
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3928
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4584
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2980
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2532
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4492
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2592
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3788
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:3680
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3984
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:2860
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4760
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4732
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5008
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4904
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5204
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5252
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5188
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5380
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5472
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5456
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5440
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5432
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5424
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5416
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5732
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5744
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5876
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5868
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5860
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5852
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5836
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5820
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5812
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5804
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5796
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5788
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5772
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:5764
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6236
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6300
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6356
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6384
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6448
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6480
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6500
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6540
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6584
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6640
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6648
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6632
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6624
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6612
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6604
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6832
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6868
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6860
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:6852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6988
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7136
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7128
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7120
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7104
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7096
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7088
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7080
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7360
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7428
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7468
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7536
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7520
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7512
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7504
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7496
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7764
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8036
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8052
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8020
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8012
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8004
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7996
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7988
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7980
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7972
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7956
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7948
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7940
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7924
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7908
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7892
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7876
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7868
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7860
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8620
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8652
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8680
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8976
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8968
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8960
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8952
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8944
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8936
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8928
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8912
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8896
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8888
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8880
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8872
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8864
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8856
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8848
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8840
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8832
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8824
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8816
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8800
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8784
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8776
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8768
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8752
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8744
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8736
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8728
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8720
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8704
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:8696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9632
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:9932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9964
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10004
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10032
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10072
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10084
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10116
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10108
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10140
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10236
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10348
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10340
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10324
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10316
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10308
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10300
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10292
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10276
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10268
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10260
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10244
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9976
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:9220
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9156
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:9180
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9100
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:7612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7752
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:9064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10940
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11064
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11772
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11764
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11748
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11740
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11732
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11724
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11716
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11708
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11700
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11684
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11668
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11652
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11636
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11628
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11620
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11604
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11588
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11580
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11572
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11564
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11556
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11548
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11540
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11532
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11524
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11516
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11508
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11500
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11492
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11476
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11468
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11460
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11452
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11444
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11436
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11428
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11420
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11412
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11404
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11396
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11380
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11372
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11364
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11356
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11348
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11340
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11332
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11316
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11308
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11300
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11284
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11268
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:4660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1496
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10472
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10436
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10404
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:10384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9052
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11248
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11240
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11232
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11216
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11200
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11192
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11184
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11168
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11152
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11136
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11128
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11120
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11104
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11096
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11088
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵PID:11080
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:14220
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵PID:12296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629B
MD59037208d7d7c36729d78dd0ade223412
SHA1acd45204764766f203dd76f54a3746adac3ac8c4
SHA25611794a3b82ff131984825e4e3225d7f0cff7458d66d55d32bb419e897d7a0a24
SHA512ff125d08b05ab353f284b52fd6c792e8e551776c6ed376f3d4c7e4a10474f8fae06600b1796273675e2b116cb8b30e9b03bd9b5466220f0c0ec84cb971dd9993
-
Filesize
5KB
MD51d76ca0861d5c9b5e0602d175861d5b2
SHA15b7ac31cb4ae1e3b90d6ebc788a99eed0f733eb3
SHA256dc32d7061c09ada9a247cac4994d793987fc32cca73bc1d75de6105c3718e601
SHA512be4e6e8f27318e678e6d7ff47704b5ea0cf9843fc8d7c684ec1822a7ec9ff4289ab7904b7ab38e28f9e6aa7b383f7955f326639575a1489ade1761925dd6c7c0
-
Filesize
5KB
MD5042d721fcbe235825214be67e7b47950
SHA15ef7a32248714691cc4f74f0d3d6ef1daa1c3ea4
SHA256e63f69457ed512d01dd8e34a3304c46c60e5778bc728dcf970fc593cb2fe59e0
SHA5124aefebdf11c052f925ff36e47060d412b736525aec499f41f810839bb2871b0902a7d10709d8fd8ecea2cd778ea2e50a8ce8065082d098341eefe184fe427dfc
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
152KB
MD5c6307511726b8bef620fa0e2f0d9734b
SHA105fe18eeede5ccb6d67edd4bdea5bc7e6a84f95a
SHA2560e9a76ed58fa01fbf0cf44ad9e4c6f4cc6a2f92adc763b0bb469e3a65286a78b
SHA512cfa476ac1912a4de38b687bc68853a79457d2a2a2808aebccdf92a27432234dd11d47f8a3b661bf37f145d32f50733ad1198675f7cd265e004639113a24135ad
-
Filesize
152KB
MD52ce98ca75ff94e6503646fa1d66fc520
SHA1e518ac63170af8f5b9c9a0658d98f9c15dcb0d06
SHA256264a4a87ef9a6349c1eb30e4259a39b09b4c861ec082f9dcb72d139f86840b84
SHA512bd3bff88ff12a6896d63859beedd24ed75471c81d3f8d6f50ce550d809ebcdff90953835d6715b04e349678c0874534d5aa6529b22e485bc0a21697c1245831c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
79B
MD5d26d160b61830aefce9cd50405369d49
SHA16aec5056e1bf712385aec61c1211ab88e801f660
SHA25688a00b4dc55070bffaa239565761f9284cce82d84202dbba26587a957761523f
SHA512fc96f4c6170c3fc6991d30ec05ebab0e02dce4f69a35e9a9a020c9f47de17d220965b8de7ae1bdbc82b1f41b0d68bf2a06440bf20b7839187a9f4b66b0cecfc5