Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/03/2024, 13:03
240303-qasdvsbd65 813/02/2024, 03:33
240213-d379kahf98 303/02/2024, 15:28
240203-swdtpseghr 605/10/2023, 16:45
231005-t9q7maeg27 325/09/2023, 01:40
230925-b3qneacf32 625/09/2023, 01:33
230925-byny1sce37 622/09/2023, 13:19
230922-qkqm1sgc4t 322/09/2023, 12:21
230922-pjf7hsfh9w 322/09/2023, 02:20
230922-csfk5abh8x 320/09/2023, 17:25
230920-vzl1lahf9v 3Analysis
-
max time kernel
1050s -
max time network
1048s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2023, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2023-09-20 1.23.24 PM.png
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Screenshot 2023-09-20 1.23.24 PM.png
Resource
win10v2004-20230915-en
General
-
Target
Screenshot 2023-09-20 1.23.24 PM.png
-
Size
83KB
-
MD5
c573be523efe7fa6841917a134efa791
-
SHA1
48e0eca79d2643680c0c360794c5b3aa23d663c7
-
SHA256
fee4e840b33cdd9603d779b87317293329f404e287e251e047f31cb6b7f87686
-
SHA512
09ffd2a2ac504e70dc9694d4149dd4dc0b34cfc4f4c7196246545705676f99a848adc28fc6db6f44056700efc1abfd4eb9b1466d679cde2b9d130f198d220801
-
SSDEEP
1536:kavkTHuFTMYCMLkqSPzzF7FwhXuAEOQV6W5bw+zmu3bs28OaTKmWG:oTqoSLrU8ZEnVfm+zR3I28QmH
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1141987721-3945596982-3297311814-1000\{0EF12843-4F1F-418E-A4F9-B0AFA9200D40} chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3984 chrome.exe 3984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3860 wrote to memory of 1376 3860 chrome.exe 97 PID 3860 wrote to memory of 1376 3860 chrome.exe 97 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1044 3860 chrome.exe 98 PID 3860 wrote to memory of 1108 3860 chrome.exe 100 PID 3860 wrote to memory of 1108 3860 chrome.exe 100 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99 PID 3860 wrote to memory of 4324 3860 chrome.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screenshot 2023-09-20 1.23.24 PM.png"1⤵PID:1916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff858079758,0x7ff858079768,0x7ff8580797782⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:22⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3248 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3428 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4680 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4836 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3828 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5152 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4668 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5028 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4604 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵
- Modifies registry class
PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5000 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4844 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3492 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3400 --field-trial-handle=1880,i,7469276463755062691,8228229629551382355,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4644
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵PID:2204
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x4bc1⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD55d19b6c89b94ba97cac9aa2fb7c4e314
SHA15bc32d9d346a39586c247347ac6c587481fe86dc
SHA25682adcaf6e0ae08ae5f8c9319ff698ce189f881c47efa89c23e2e67bf8c4c3175
SHA5124bd5c77c16ba3e139ba8859c635ad77aaec353ec1b96e3de802fa0a4808569fd42c2cfa8ae18709de18822c9a8b97040262b1375165d5c8fea0faf2ef565889b
-
Filesize
1KB
MD5d678dfc97318e37d854cef00fce5011b
SHA1869bd64e09077088fe04aca1522893a3bfc8422b
SHA256c41d246ea64e3355a92a2be608f03330994e0cbaedc13e809a6ac03a36a51548
SHA512e60a53fb487f3525adef8dccda16d3ee97927ea1d7f1b9101f5b4c953f4af379b897ac6e66bfed3f1959a7b423dd4569ebdc2725d5975e319cd325daa360b654
-
Filesize
1KB
MD5e5301ad4477f1f3702112fdad8bb0ab5
SHA1a15b5c349c6708ef97dbaeb9659a38c6a940a54c
SHA256d2881e9d4eb83694ab5c2dbbfd707c2d52a494f20e8d12f40527aa6dac0d28be
SHA51231cbce8b75dc09b4774a5f37c4383b6e3d187c7ebafb5c18e800c8146612637ed24e6dfaabd8dcd74bf90dd7821e1748c2f6fefe453c342d7071cd5676448641
-
Filesize
1KB
MD560da724e14983aa3393f006a288e6fbe
SHA1ee071f2b39c6580e3e9b92c5d7af9bd4103a26e9
SHA256db5b6f2b2c47a2f71ebbc49691a3074b4ad063e8942329c6c3070fce8024d805
SHA51207cf3ea97c6fad64d023feadd550366dfb94ecd84030d823c7dab55e66e7a49014d05caf363ae9c339fca4d0774cf716db67d3f4a36e8a04f5fc25f6e86b7d43
-
Filesize
2KB
MD50c4c2ead6e203f36302af086cb07f0ff
SHA170fa5bcc88c50fa8eaedcf2d9ff8c8d07ef8a04a
SHA256a2af2745a8fd9959c370d56362d8990d0674341ff9f39b264bc4b9f903d010cf
SHA512b268c854f0e5725f1f83a154de719a1d966673fdabdc49fd93205607a1755503332f99344ff07f78c0d7292d10ad4dce550e027383516d9743cb6d05ccc3d174
-
Filesize
3KB
MD59ddf078946573733d4706ac52dced617
SHA1c7c19aa90197aa08243f697792881d648f12f741
SHA256507a61a5c57f0e3aa80e10c835abc6714125c04dc982021cfc921f7c24d699b0
SHA5121520cac435de8bf2606137cb29c850e72e465f72c8ec1f5eea5d482db1804e3f4d77f475eecec8a5b5e5d91a1ac06b5b207f65dbe7406090e2189b7da2c8024a
-
Filesize
4KB
MD5f182d20770c80acac438912610666a57
SHA1f4e25690c797c35f90859d2f802d8123eea546b0
SHA2560079a9446a35a138259bf21c6c846f8c46ff63705d67416a56c2e69e8952be86
SHA512a7afd6946f8c2876961717988f263ba2b404921653f5a15fafd007e8898c6cf93c76fac6c77a12fecc42b7cbae982f06c0187940ff4f0135f1a155a52a237f3c
-
Filesize
4KB
MD58c2b7753344fab5490b7547f241fb5e3
SHA16ec8ca41e3ebee85c24d2cccc6a9c3feaa308c54
SHA256b992bbd545f5cd287c63d145a6880f038f42514f126f17b12ca717894da5f3e7
SHA512aa2811dc6be665fa8d2d42bd308b07ea3d369c0e8712ce32468a9ce59b2bc5538eff8922bf4fd4ad5e40c61e553b4ba3ac471054b67c1633201ddeb948a034a1
-
Filesize
4KB
MD56aa610c665c57cb533991886f6eb8e6d
SHA142cc7d0ce86f3e2aa2c205fd8d3de2ff02ceb00b
SHA256772df3a849c06e9c4f3c1cc45855b9a6e1ece531ddac1e793a4413792f50eae8
SHA5129ba3c1f3407dcde5b24e333ef77e8d38a63f6c6883ad5c6df8f4f2e6ad1c8d8f7678e2f5957f485d5159abc202c15e4591f659ec14981342b252d9f28060f4de
-
Filesize
2KB
MD513b39fd72d5add7cda7eda8f3fbf47a9
SHA10bc03b6f0c0240c0157bdaeaf0c27f3a2b6bb4a3
SHA256272ebc7177194b26bb67dcbcdec5355f1d4510538e39ceb93b10871c72f9b916
SHA512e47f853c7440624469c829b24d25ed5702175ceb2bf6d49ccaa867b17216027258702778cab1e87ca1b175278391bf311da67551e53d2ec1f575331836674253
-
Filesize
2KB
MD54c1c0bcc268cdd9865b175f08b15b248
SHA1113a3c674c15faea8c679b88064eb4b0ec67cdb2
SHA2563663e7de69ffe9d9b308d6ead2d8b825243d47e9e12608e1f1a923244a20742a
SHA512cf535c0e598da2533a54460873ecb8fe0d83e0ee7f46196a5de82711142ec9d48ce8121fb60ff9b55b1905fba5c376490493f2e1378c28d44789cb4aee618778
-
Filesize
1KB
MD5483211002a8cf04964c0b881869de0c5
SHA1c104efd6476cceb3f6074f94ffc84e1453ab00c0
SHA2565c5865c14e964ece553b6ac8da07404b473544e250d00526f81352fadb481508
SHA512ca711f93c17222dd719b929956a79625b2dcf2863c54a7eac2cd394a8ffdf642ee7d53f296390f9fcf1899717d18fb07c7da03c06ec9ec61c50c66e860ce6ae2
-
Filesize
2KB
MD500b0bae5046f96491e6b42408ea4c823
SHA1a3191da59df8a0cb26c26fc98c4e532a576587ee
SHA25669d15374537ca8b73d5bd1be4764199784873e6022f2abec9ec59d29a15da35c
SHA51250cf08e1715c1013ea3536b68f028587869e8a921a44075be2ded8fb76250e0845d55a19fdb477ec8f104aa35fd1974ef78bcf712000203be2f3aceaec3ecce5
-
Filesize
2KB
MD53dbb13395fdc1e04e524b80d92234477
SHA1d4af7014638b803755607075319fcc371a17eb7f
SHA256adf4260336c401ff11eba6cf24393f292120e1273697028527e2c3954853c0af
SHA5122217daf5667d64685774ddfd9a15badaa4fcee94a4b5291fffb4e1294816a16de8e19648f7d9ecbc259d3992dd8eeec1be120a6521ba81f8838df44db38afe73
-
Filesize
2KB
MD50e1e664a5390b50904c95935fa469e7a
SHA1d4681736c412a57ec3c5adbdb4a8791df4b6e835
SHA256464d02aa4066c3ec94de7a0f0ba0dfd4eaa5f1a39bf722bd2d1a9d443e536f84
SHA512dd60d425ddfbfc05b75975f06c5e13ba4591671afa6364d3c30512d91e4fa8c3255c4300a97750144bec490f55cf322b23cc5297811200e634ad07f3a40bd590
-
Filesize
2KB
MD5846c0d3e22567b6a5c54f1154805085c
SHA1ccef67be30b76639eeb4b4bfe34517bba98b33e4
SHA256a03b14aef34cb2e01f34a718618391886afd92ad2e40ab373a3f6b15e048a4a9
SHA5127a5c2597e7af1c8eff5f62fcc40e8c3a558df7b07aaebdd245a8afa03201aa221815d373d903348fd6c1dabe60185a35cb8e03cd138531c048634d6c38daebb3
-
Filesize
1KB
MD539d0879fbeaebe82c3a1eb3fbfc40296
SHA11df7d024584f826a6c4c78f0a6ffc7ce0fc8c6b2
SHA2565ce592321040e9b6dfd6eb17ba51fd084e29fb128297d635fb1ce5532368cb8a
SHA512c746638e24fb157b23a9f78be17d975c9e9f65ace39d240363937746ae5e1364688f33aaec97e9fdb9e45cc78f43873b62fd4e19148b740267821efe564c0cf8
-
Filesize
2KB
MD5bbb0a99d0c5c8f6b7b2fda2b06a7b583
SHA19fdee82d4b8e52aeecf1d03941398f7c9374b507
SHA25655c40f3d9273104acfeca448f2639bcb677e516b975caa11850fc921ec45328e
SHA5127a0a65bb24ecd22a141922f2a8feee31331c4b0a5527814fc450dda25b67a8965cc9baa56e04816a6d68468626d2541b28e353d0a5cea56725c5b32e96b2757a
-
Filesize
2KB
MD58fbd0aa92c5f2a83531ef4cc08b9854f
SHA1517189a31b738caff69714ce21ef477e5a682044
SHA25681fbf2b5a0a15e9155cb3b1be8854437ca254637743f7a892da9fb9c658fe401
SHA5129c91f4837ccde9ce1efe5a2140660ad08b4559a333e35877dfde6bf3f00c50595dbf370e129b20582c35e3d9ecc18529cd9d829ff7b1bedb2cca66915538b550
-
Filesize
2KB
MD5ad59489921f6792f8a7905f2a89878d6
SHA1ff2f94f8f8b0b4bba5258cd7642312afc8bced3e
SHA2567b9b65328065295dee14dbebddd080ca4444fb653e295bbf94b989e85a983923
SHA51291a44e5b89c4c9f6b85989ae4a12a8aebfcbc723b6dc74eb93b452d771fd3526f9df643d523d8898d349c32d21a43d8daea8ba31552aafbc00a40ba107037a52
-
Filesize
371B
MD5747aac45af4cbf23874f8666e9952007
SHA1eaabeab7f66aba8f787231198de7f709f8cca1d1
SHA256b0c7446085b408267e68c77fd529fa51aa7a7b3483bdc1da3a8de2e0c093db7f
SHA5121d037950230c189589c48f9233b6ef02cd62067cc22184d4efd866827b6e79ca2dc3a4d8ba3888ce0deb82c18de5fc36ad6e012bd993ab84862639ff93ffc40c
-
Filesize
2KB
MD5c7a2ac7bd12b0c1e981b1d233a347f90
SHA1e5d80c5c3f77113f477a9ea88153a9a6aefd1b15
SHA2564a10bef5222810cdb7265a0a95a2efd00f1242abda9d102edbd58c16e53d5ea7
SHA512722a7397fc5aa4416b9ba2fa3bd3770eff2cf248947bac4fe7df02c7869bcf20ea3bc2545e4b369742f26e959608f5b7beedf83fa4b970abe3e1935f4c746251
-
Filesize
2KB
MD5804d39e8f84de0634f24aaea48c64878
SHA178795d2846682da5b8606bfa4e718f29ab0ec700
SHA2562cc881b7a9d5360b36da26ef366dfa22c7bd6399512f5be3ce887402c35ba17e
SHA51222ecfdd569efa3c8b7ef0da1a3eece96ac08496106832a3ca5c858c80b61d94984ff91a4077675bc456d350cc9a9445c911dddbfbc25f2e3958a0cfb9b49fc72
-
Filesize
6KB
MD523781233bcb4a54d3d6196fc029cf82f
SHA1e03d8973819df8ca197c1ac32f62f6506ac9057c
SHA256a4ba93c503e0e5d44ed41cd0ef8a7028ac3149f5333053183fa560798d7341e2
SHA51233e28d1f471b2b28968b8613d12d195ee09498ce54541b3e73f6973103e1b433ddf1d3d8163ba335a3f5e25938275de2eadc7be478c079fc782981c1d1386388
-
Filesize
6KB
MD5a9d85b11a8c24ae05ba815f9e96d124f
SHA1e5b1c8c1319253da99f99f6865bb63fc26f4f57d
SHA256d595d7ca620c50f5f0d2fa25b1f7e9e6d471383e32c8cd8343a7fef821d84b6c
SHA512117abf4d450f97ab9e0a81497c518a68c95f3a255ad35191b569190abb2a3124b49f6e1623d497c6abbe7311b9a2bc1d9041af3dbdb49014b8d1c46bf9352c81
-
Filesize
6KB
MD55f0d7428c6d32bcfba7250e75b6452de
SHA14ae8efb182aa27da4b1c8aeba757d06cfa5b27db
SHA25628404f19e2d64af8e65d32c9b744322cfa528c050bcc53f320778d1e8958aae0
SHA512484a6484a635dfd4b0221130016009e1a0117a593eea37f51690ec6f9f4309779d1e3957019b75ecc7945503341117fa91696d0e562a3c6b70a75edda3d99374
-
Filesize
6KB
MD54b29bc4ae20872e112b4df44c56976b6
SHA1a25a4bcabe4a6a795b6d757997c5daa6545fae97
SHA25678ab9813b8a482c0027abb91e0295aba1d2974dab4b2ac57e5f823c2b04e1456
SHA5120939f141cdc35c93dbdbd82e9586ee877a59dafcc53e696a474c471fab887f34865014abcfefb3e4762cfa4b0c59f9ac22567b5702ef9c93b083a6e3423b25a9
-
Filesize
5KB
MD5e1844a581f3a2600ce4d6b955700b0c0
SHA11bf64b579d15ca4f8c07be4aa332ee2c81accad8
SHA25695c56a0d73963d30605434915d08d33c2e5e77b5c2563960cbb63331c2ecc43c
SHA51273b2f45fab616ba68c425f8e5aeeb69b965d9916411d1bd6d932c13ca871c13df9aebadf3914591f1c656116a89b8d906ccdcb59e7cbf64a7239c777ec5d00ac
-
Filesize
6KB
MD5fdd68b2b1a84c3a5e935deb9f7f964c4
SHA124ac272b0e3a5e69c500038c81aa4e4d2a9c0d5b
SHA2567663b0436494a648dc913e2814c1eece8cd37580b576f66dd0e595f24ca86ce7
SHA512a2c2f23e13e2b6dfefe0c8c4b758b8ab86ebeab2c95bd7ee28a3daf495c73aa896d46b443e840bfff8a2c7a45859062d4db62dae1d0c3e5f78425f0223b1df6d
-
Filesize
6KB
MD5cd9fbda88cfc77a33b80ef8213cab62b
SHA155acd6a8645e488a0f9e7b1421c1b203c78a292c
SHA25692da4ce237e096b502e727a7fdccd167ccb72a6b86b518841f2c3e3250c55a1b
SHA512c83e6fd6ca335d6e2a0a5ef183618af720a78868412d3f16f183dae146cfb2738e6b3e53d485097f7fac3fd8f4e83687e64ff4742acee24bac4055dbbcdd34e2
-
Filesize
205KB
MD56cb7864eb0343d3edcff51218d4d7349
SHA17ae79eb05dbafc47c06b4bff5bb8a93d5b0d6f14
SHA256bc37bb2bbb415f0c8eedfbf9f77dc891505af0f47c26e51c4df898b35a9bb2cc
SHA512078de040ce936b804f418c7b3b89caf0b9512f59b5894cbfa42184af51bf081aa7d94daff3e576cabca5c91b6dcdac37f3278f6cc646296aa63e338412174b36
-
Filesize
103KB
MD561928feadbc6b522298701532d15a36f
SHA1ebd60bda4daa9da0d954add40dcbdc7fdfe87618
SHA2562daa2c3af25c51676c46ea76cc92b4eabf2249dbcf26a4db8b872904c5af0579
SHA512c1f9b3e94ccd3292f93cb652dfc22117ecdad3349cc336491775005b40d36bc86e0a94ada4a2118d2a3216f1b3d1bf0c0624bd54b9f4b164625120ecf7d951a6
-
Filesize
205KB
MD5662d1cddbe9aa4bfcdc19c295fe0d860
SHA18061e5b402e881696b41a84a9011f4ab34ae542d
SHA2569af4fc6cfc167e19c30b0d6b6224510b0b5574e970e6cbd2f0a2c89831c47517
SHA5125350de57c286572e4c8f04da2630a271142624dc7073f55732c25867adc0f63ce4f02b05b3a9a16bcec69d3a931c377d457a642f021a1ea5362ca14e901ab63f
-
Filesize
262KB
MD55f41129d5d6776052ef75e7cafc97263
SHA1a56d01d4a416f80e90748aaf08f4c3d67d062ed1
SHA256d247745bdf9358c91ccad089a4b6365b6be2c07b539bc3671eb67fab34d7ae1f
SHA5123fb28517cd5f558224c1ea07ed0658bb6cdf94a2ab55ace7a5a688fe67c434f4e6ede24ee54e498cf1410acd6761f0e68f820341ff00ca8c08dde44110f05d29
-
Filesize
205KB
MD5ee70d02c8e95c2be17ce08155ff17fef
SHA122c437dfd5a9f05c2353a821c9b2fc883c4293d1
SHA2561cd6b7041c3994c4b1f020c0d6fda7957facfa134038dbb9c2e63b28a4d0a5f3
SHA512bbe9146d6be77220b36fa74e1c2fc87c6508467b21f7c3f61bcbc3e62c7c235e03e78e9753d1105d39e589f036e7d58e806c3576dcd70980e1df749779724118
-
Filesize
205KB
MD511ddeb57e6327af135d167b7315bb7ef
SHA1df0788136331afc4c12ad144a7af1af4df4b60bf
SHA256e458648062b16736ed191960f26381546278dae5a0d8b5afb8be448220f5c59b
SHA512a599510191b8f3f5d35bf5f0235d62aed7101ef568efb68c23aec8b3b05cb244279fa2b5966253aa185b0ad85f640ecd03f5fe0ba7181779d1bb76d314ab7ea6
-
Filesize
105KB
MD546619ff04cc96397765535abd7a90c21
SHA128df1b3efb1f31596a50eb5f81f45d87a6d8786b
SHA2565e0dee781895a762852783bec3a68170367dab41af53f4dd9682a10322dcddfd
SHA51203527464455b78daf5de4ae97ff0dce0777d923e64ef0fd4a9f0866a553b9ae36e3494bbac0a737adafb6e13964338b6492aa81cafe59fb7e7dabf504b87d714
-
Filesize
97KB
MD559649f273e19ab28dce915ea84f80bfb
SHA1ac81ff6962f79a68450e4bea3eaabca781821ecc
SHA256d5cb6b6c7a33194459f7382db29b5628860c2ae3c88a715d1487b1742b82eaff
SHA512e9fa3677c35000ebce8160942c590267b4249e321c52a917c1bb82c7ebb90f9b883348392ecc7a9868a961dae72933939bce4eb8f7acf687e5a7d1d10287a365
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84