Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1553s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
unnamed (5).webp
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
unnamed (5).webp
Resource
win10-20231023-en
Behavioral task
behavioral3
Sample
unnamed (5).webp
Resource
win10v2004-20231023-en
General
-
Target
unnamed (5).webp
-
Size
428KB
-
MD5
2a9b8f542de4e6ff879319c81a042407
-
SHA1
f9aae39fd7b1a7e5f9226265c3a60b5574386205
-
SHA256
df8cb3d9b1fba73d35f55799f5b643f8e54f28d968d197fcfd2ed47d54cb913e
-
SHA512
ed72be142f4bd074d40b3779465d3450a775599156bf95da0faef95897660e0db89260a3af31999d1bf5d82720ff67aaa706c5dd0c437a37854a5cf9639af1b7
-
SSDEEP
6144:r8PK9DsfEg3llI4y4rY2JJJU7SYbglNOW0bWByT7f3LWwxb8eUB7Cg1d+blgsr:AsDWEgTIZA/nBMiw1yBuqdDm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2432 2196 cmd.exe 29 PID 2196 wrote to memory of 2432 2196 cmd.exe 29 PID 2196 wrote to memory of 2432 2196 cmd.exe 29 PID 2432 wrote to memory of 2176 2432 chrome.exe 30 PID 2432 wrote to memory of 2176 2432 chrome.exe 30 PID 2432 wrote to memory of 2176 2432 chrome.exe 30 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2676 2432 chrome.exe 32 PID 2432 wrote to memory of 2808 2432 chrome.exe 33 PID 2432 wrote to memory of 2808 2432 chrome.exe 33 PID 2432 wrote to memory of 2808 2432 chrome.exe 33 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34 PID 2432 wrote to memory of 2584 2432 chrome.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\unnamed (5).webp"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\unnamed (5).webp2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66b9758,0x7fef66b9768,0x7fef66b97783⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:23⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1064 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1428 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:23⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3408 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3488 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3728 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3856 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4000 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3408 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3676 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2432 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3952 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4108 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3864 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1480 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3660 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:13⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 --field-trial-handle=1332,i,3025018938410052179,12357089050133265283,131072 /prefetch:83⤵PID:1716
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
441KB
MD54604e676a0a7d18770853919e24ec465
SHA1415ef3b2ca0851e00ebaf0d6c9f6213c561ac98f
SHA256a075b01d9b015c616511a9e87da77da3d9881621db32f584e4606ddabf1c1100
SHA5123d89c21f20772a8bebdb70b29c42fca2f6bffcda49dff9d5644f3f3910b7c710a5c20154a7af5134c9c7a8624a1251b5e56ced9351d87463f31bed8188eb0774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344a1168872df52441ed88be84ef5090
SHA15677afc4f91ac93619417c35f08734d8f11a67b7
SHA256e5ebe8f9a535ffb9d4e374301357d6352d02f20062d213c24b771983fb9d62a4
SHA512ade41a9ca12fdc411c48b6a8c332f58686033474c0d7a5d471a1f00e50a16dee561078c07ef628f8ef4e3cd12816099830ac687fa67b517b7e8df19ed022285c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fdb0e2f56f59b9f5b2a63367b36e0be
SHA18ab76b1a4766ad1426c8b48f17920c75661ebe75
SHA25620aea014c7e9c93005ad1654808fd5362c2acde9ca6909345097fb8ba62f330f
SHA512e32dbbbbaac58736457f070e770b5cc151ec5412c4af3b9db2b9152dbf1b510fc7dac667adab46971726fc900b0993328da55a6e886b6df492e835df7c6ed775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294f99f5bd4dc8d60d59863ce0623c3b
SHA172863f8488aaeb0ca26ee8cc9ed54ab687fb07ab
SHA256be903e5237014d7a6923b92e33471d0769143da9eae74d5c318c0bc4201d6f49
SHA512151f20e6e2d873514af940b23884710baed0e07d760f9969c8f9ebffb5e9417ffc7c8541f0beebcce7c927d4a6804a3d0eaea5be58debbf86fde3c002ec2e059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f1b4c058e5a5b9508248d78e14bdaa
SHA1e758511ccf9ba0704e947d261a85a4282c316027
SHA2565c36aacfa1986c3730a9a5cc50180fb1170bee581fca301d206aea833a8a9a50
SHA512a397240b5f9d3933a6582489d788e3430db869cb678be76b3ac891d5a33076c89a0857e3719dbc427a45a9e8ee11ef41a7b2727052835dabd7d718f1b6bd7ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c167b2aed3faf32539bc24c68b662e2
SHA17c45e8c6e6c262188603f0309f3152bff21a545c
SHA25655ce4549e887f628d736982ca529666155678dfe2ed7f21ba608b4eaa58d27b8
SHA5120188a4675624b0462c835b756a1b814dfa3b7642d03657bbf99b64a66d091b4aaec2623740b323c516284cac592b742aab3a24e993059d9c80aa01dc91f24b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de2a1d5cae9a381267cd283d4bd06be3
SHA117baec457f928a720ca5d876781072843e2d613d
SHA25625e82a27cedd6c48d8fd4817a8c01b322d2f7816b700d1a292093bc72a568b90
SHA5121197aea177499512a0286744a2772563f895ec8bbd715ea81431cee1612a5b9a55bb4e31de2a1c7fc9969409adffe206f0c99704cba3d89a3fcd36698fc45fc0
-
Filesize
156KB
MD5e1be395efda67ee29c99286a670c364a
SHA1cbce862903bb0cd05920dba8415316919dece8ea
SHA2560638117dc2c4eec351e7ca87d280c0006a188eac1a03cf82b0d9860c5a41d70c
SHA5120faf8745fac1c1665e710dd050fdd22fde93cfa631b253c4f1b7eb13638feb4475f8601ce89771b1d93b98226279ccaa3b4a76edc2d4a08ec37842f8b23a1059
-
Filesize
480B
MD5848561fe0f4ed626060846a3e3df155c
SHA1e56a5617de214df2217fe466137944642239df89
SHA2565628c0baca6b47cf6faad073ce203f4ead68e9b906540e083818159bfc884984
SHA5126117e623628af73e83866aedcaf7b2021536b2c0364ce88db91bf638275969453e3c98a8bb2dbbf586ac96517c48a0d29b831378013fec0a53956e05fca93c7a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.xvideos2.uk_0.indexeddb.leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.xvideos2.uk_0.indexeddb.leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.xvideos2.uk_0.indexeddb.leveldb\CURRENT~RFf76bc6c.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD587fa8a17833cc65edf31321cb8f6f4ca
SHA11b9b387731c4e1a1de1c85df8a4c814d25dba73c
SHA256e96a5e8eb8a8c393742268fe60c0e85c4e131fba222ccff5ae149b60d9e224c1
SHA51202c65ce4d468242d338815eb95131078252ea67ffa70b528ae74808f32314b6712c74dc2a3d7cd1a7872c30f06f7838e514567dfd097903468b5b98ceb2d2070
-
Filesize
3KB
MD5fc7d089dd18c47ac8a1f97942310e0b1
SHA1c7c7dd81e5701254c9c986393f4e3c11951a95a5
SHA256b5f9364eddd3c943c14f3dca62e63b6d1005195b539a8d10f9976bde3da19cf8
SHA512746c97655b9fe11f913969b005a668eb4450b7899c43aa24167314211fcd0fbac0488bdfdcca73d08bbb73bb9f6b8f0e158612137a7fd2214f35ea49e2390be6
-
Filesize
1KB
MD58fdbbbe5f71bbec79857c1a5cfab54ef
SHA10b6a73f385b2e410cfd79346bb8309e3c20a2243
SHA256a67fc4fbc6c2106bacd531ee428b58981b8b92cf008bdcbe5162a00d54801496
SHA5120c3dac900c4589c68c3f4ed2f776e04b03b9f7c7e51a772efb6ee9dfedcd5e9ed498d63efb1045b78d4960ee64140ce08ff4c4d774ae44a7d41522c6f3f6c55f
-
Filesize
363B
MD57cb4cbe30b72830cfaa92866eaf6b93b
SHA10767f7f5ecbfe48a77a9182101bab9835af778f7
SHA256ac949c870898050ece1df0e6f146e397d55c8b32e664eba9da8993e00e4a8803
SHA512412ae872b03c882be9881b8da2f9d2bb5142264d3bed33cf71d41d5e75da646ffece944a11a59c1af46feef5149de88bb2bb0854ea81c884149a90c2f09a85eb
-
Filesize
363B
MD5207567ef669228d96ab4d48da92d1195
SHA114a5e6777583224df756631b89ab7effd650612e
SHA2560db29cd4a37fabc9bf2dcc0c90bfec73eacc520982e42d9bae3e861e501ddea2
SHA51292979f91b78a3803b36e193b10d00db5996dff1947ee3bddca9e4d6dae9b58e224fb0f6e426bc4a49518ea3011698b2ddb307599609a1508d18b00574c1a50ef
-
Filesize
527B
MD53fad21af71d2592645977749019d8381
SHA1507d7887db61331e7c30db03f85ad379a0b70949
SHA256c3d1db18495ceb3a4649d0a454d0ff166e607bc8bba579bf521e2f48937df637
SHA5129a0d2df9fe12ea2526c49a1280092c2894862d10f48b7e3b65b4ce722469d1fd4c981989a6d656eb49a59382e7eb4c8d419d6d30ab4f63af2481522caf0465b0
-
Filesize
5KB
MD5a450f6653bfff4ce841f94fe407a0db4
SHA1dda5b311e3e152ad4d5d9ef2a41492d35edac97f
SHA2563a2d101d6ad3651140d6abb7608ad02e6a77d348390a34fb06cd82fe3468802c
SHA512716fe9fb21e3513d76531a22603bbea5b4f642c5c407c7833f8dd015584a49dd150de5a37fb3343a854c282f98d418acedb0c9d69a73d16fd510861ee4eae0ae
-
Filesize
4KB
MD5a5a6c6d006ad60c2a4e888dc498a64d9
SHA1de2dd60f02533254b966c862b94d9b70f341df00
SHA2563f04c3b46f40137a18dff4d484286d7ab8c3800fd836ca1f8dbdeb56f55585f0
SHA51265852e2a8548888e70aff0f676eb94908fa880d6a797b9f992d2991ed308807a83ef18e96af4d1a26dbb41119686b6d103ffa54ff4f38903054f57b5c3a4c02e
-
Filesize
5KB
MD5b31bd043fc96adf9acc26e15157b2755
SHA1571ad2c1aed877b435649e484c9fbaf76b87ab6d
SHA2569ad4f390dc06ec247622fc6d106f74067017410d635c9c024f0eb9c8ecd699b2
SHA512f12b3c6c79347d628c1c783b4c93152cf1f06c64b6f73a26a7d73ff17bcf661bc5cf3f685191956d3674dcf2c3509f1120f732cdc56daa638d8863e3b9cbb00c
-
Filesize
5KB
MD5ca1039bf17e485a81e0da05a174a6de7
SHA1d008fe050cdde259e1ecfdad50f3d197072ec61c
SHA25664e177fb954f335a596a955791101bbcdff541c20d9083878ff22f0d6dc36125
SHA512e6fb28c87c2f8f10d378638ed7850872ec6937fb7a623eb7dba04259a5ab01ca7e57a87cbe5c68d383c4d3cb2eb1d094c80b08f779cebbf958e0c9b621d135d3
-
Filesize
4KB
MD554369435adebdc3dbd69cbf1e9f1ed92
SHA15998b93455f66967ece17ca25f39ed6b3e866eb0
SHA256e4196f7b4fdf062e8d179fe6d5dfa245a1ad9b678661353c026e60cde7dcbf24
SHA5129c2f2a3ae759e180e1a56f373e4c69c8fcb789412a6ddcff04f714ba4774a6b4be73345765d738e6e9ebd5c45f94aced527ec8ef9bf4190f930bb2188b707427
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ba5682e4-cda9-47e1-a75b-1c01020d2b47.tmp
Filesize6KB
MD546b058d5d858aeb4464decfa79cbf61b
SHA1d41ba7143ec8823ae634546ce066f55b34b63702
SHA25646c8f4afaa86eda4756f9cb03badc6f3d751310eb8307aaf2746294ee6ac5495
SHA512f6f4c52642c22fd42cad799843577a7f5ed609b646885e62bb3eb28c27d82db15db81b19cc1aaffca6e00994174ca41adcaf7bba5ade0cbc1463970f7e31eede
-
Filesize
217KB
MD588dccbfc973a3835f74eedae6f333d8c
SHA19c3f1c2348106e42664a8411c49349f310963e7d
SHA2566defb4301f68a86c5a71406983c509ed44214685386b902dd733892bce1adf0b
SHA512fc4e825c98a747f8b69cc96f85b8a5b5b023218673d140800b157763bc669b944c8792b082cfc02e09d5293bb04274b5acf01a941d2e408f3ddb4819b878b22e
-
Filesize
216KB
MD53eac7e368605f617904a75e69dc39013
SHA11e6b93b36007cb43f3811944adc658fdc7a9cff9
SHA2562a04d378495eefca851b52fe2338858b824bd5c2092746d1729409f32354e715
SHA51271436539c8957e952c122a4bbef32186efbd9781ecd47d0f0f3ce5f632f6085bf960dd7e791d81bb58491c90b2776dadaef7f7f90e457378be25c4b156c3755d
-
Filesize
216KB
MD5b54ba48110ec15ce9fd2e2f5547c45a9
SHA17479ed86e7dd3a5f8b7e124c692587bcf87aca69
SHA256964197d9fda2d4f6b90cf6b95370b0a42535ffa732cb845986c6782da5b9d0de
SHA512efeadff88bf16522cf50c18796954c5b55cc5e25418889ea220c1c021603cd4f9475f19e22250a4e110e5483240a5e24a4d8e58099318d5ac69a39ecdd75fae3
-
Filesize
216KB
MD592ff6150703314ba9a8a045548f4f3c0
SHA1d1644416112e31fcb69ff4255ef3fec74c81db69
SHA256343c4ec14e7d7c857a2a8c59fe90048bedd9342e153d90b2f66d2211edc95dee
SHA512b24657863ab0ba981c1a1ba53686ee3354c70ba0101f1bfc9bb28bea867a4660be271408d4d9a8ec65bd890ca4ae67cc4fa968da88e85280549461e1d78c31c9
-
Filesize
216KB
MD50d6a657c368bc2f030cc6f9ee038b0db
SHA1cccf1f779956f41cf198ff4cc18e1ac667b34b71
SHA256ba1f902c9d0844c869597adfe10bd8db8bf974fbaa5f1f6c43610d49ef5f8338
SHA5128f9eab9c42d28f7d0d2944303bdbad9ff7b0811093a41b4db0e8ff8e099925f4999781015a7aa09c90da1cd3c049b048a061ab41a5e260fb4f84a09a7123672e
-
Filesize
216KB
MD5fa977a40453be54147f051073ae4bef7
SHA126a780c7f538416152c0facfea764dcd4f519c33
SHA2562382de33dee51bde8273145b19ddd1e00d9e5cd30f9cddac906822baeda7a10d
SHA5122510539ad6dca70c82c1b6a7dd863c8f6482ef8aef7c0a30701264c6bafa9297381a5636233fdcc518c52ce0555b284b13547920a076711abff8cd944d299c07
-
Filesize
216KB
MD5c80738dbde9b6422bf9df3ae67c4d673
SHA1b44058f235244c4d7832ac79b039db32cb43b08a
SHA2560ff7975d476848d7dc2247f03647d9105bbe8e04cb4478f55091a7f82f4abef8
SHA512258d5399566caeb058fad23b2e9413af72f3d51ea2e5b173013d96398188c96c7f3781c171522651323b8a341fc30708784216676a6c97265fd1effb7285c7ad
-
Filesize
216KB
MD59206701bd5a0cd56630b27879668a817
SHA10dd8e1c54ef0e9751c46c2c3196c98a1a83a5d99
SHA256b3748081aa8359f5ed1066c4e8c8839e8ce552870b376f5b45d7128cc2465811
SHA51278531e10fa4c4826881bbeab9552339cfe65de17998f3110675afaa95ac4282f4cdfd82338a36838cda48a96cab21fdf886812ba438917207cfebd6e1e5f46b3
-
Filesize
233KB
MD52a98d5ebcf3627bff008fdceea35d1e5
SHA13edd7462c2c347e6a83dd5240bf6d31a191aead8
SHA256d8e31a6d1a2e17418cfc0cd5dadf742e7bf85c19a215bb16837a8da756991778
SHA512abf05b251fcf8df76c83997488da1cdf7459b1960a062602a4fee25af77a5f6afe772e89de7b567a41c35a002466bc2feb1ddfeb84d65e4278bb2c56daca7ff1
-
Filesize
215KB
MD52e069c7b404096e31317c1d54fd23269
SHA1cc908e68958b73f47dd3e9f97b448667b43129c5
SHA2565788c5ca21ff2cfc27dfa21355a8780f03546fd1d2ee9e32ecf4d02e9e8afefa
SHA5129acc8c1fdd81277947504063fc814cc2fd241d11c9499c3ee7f73b3a5309d810c13bfa4ced5a12c2bce8d83b3912442df90eb6084f6cb84d0cc3e22a3acf5011
-
Filesize
74KB
MD52ac830f8ec4049598e6df6ff26a99736
SHA1ce0dbe54896c9a0556a60e7916152b0445e926d6
SHA25631705bb8c610d7299117dcf74c88ddbdd539eea24b14c95b7a2e6403239c7104
SHA512ac6156587b6934160a8a0056c1e7ac3347855b274b0ea8ca31db0e5b3876d5ffda05d9c595cf341504a84a1a542a2346017863c66a3d3109aaf806283e51bb39
-
Filesize
245KB
MD5ef898254784d649f7e3f152d0003ef58
SHA160d4a2f66baaacbf6ffa059559b737a8c95976b4
SHA2561dc1bb333156fcd3c738e8debf6018922b6beb74426844d95e8cf570aa3ddde1
SHA512cad8d619444a625c58968eca9dac20151b7c40e40b1d8fb60e109aebebedba8d9a8e6d816c7d689107d04f8294ba54f4959d2a57d39dc4f738ab1cfea5f430a5
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms~RFf782cea.TMP
Filesize6KB
MD5fb00c4ba475f8712bba989ed59fccea5
SHA158a4860c1291a2c31e62856d39a50c02adff8faf
SHA256181b7ff81fbf6c52bd6920912e049ab9075d923234a9ce2b5aa36cf7a3faf8a1
SHA512d1fe25ec865b6f256eab54212b5e64c1c35c875ccb31a41999ecdbed9e8b8607e58a25133deffbed21cb889476d457c9028a986628d61cf70302034132fef13a