Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/02/2024, 23:47
Behavioral task
behavioral1
Sample
B738C981EE80FEF191C95D3D030BA5B5.exe
Resource
win7-20231129-en
General
-
Target
B738C981EE80FEF191C95D3D030BA5B5.exe
-
Size
467KB
-
MD5
b738c981ee80fef191c95d3d030ba5b5
-
SHA1
5f2835a1e94f83b38eb7dc5f1b90deb2edb0b3ed
-
SHA256
0b9ca6e1597ec89cc959fd7f59820216473675c4178cccc5a533551ab8a61099
-
SHA512
9b41936dd06d9a66ec5cbbd34d366be74e8a197d092f896aa643673ec335ec53757a7817787b299c0dba9890019db682f023d741ec58ba5f90887cfb3eba4cb1
-
SSDEEP
3072:pzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HI/oRL/1eORKOfUxCvq2RhFVyFR:pLV6Bta6dtJmakIM5FvpKpp2RVyFRC
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B738C981EE80FEF191C95D3D030BA5B5.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1732 chrome.exe 1732 chrome.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe 1972 B738C981EE80FEF191C95D3D030BA5B5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 B738C981EE80FEF191C95D3D030BA5B5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1972 B738C981EE80FEF191C95D3D030BA5B5.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1744 1732 chrome.exe 29 PID 1732 wrote to memory of 1744 1732 chrome.exe 29 PID 1732 wrote to memory of 1744 1732 chrome.exe 29 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2388 1732 chrome.exe 31 PID 1732 wrote to memory of 2456 1732 chrome.exe 32 PID 1732 wrote to memory of 2456 1732 chrome.exe 32 PID 1732 wrote to memory of 2456 1732 chrome.exe 32 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33 PID 1732 wrote to memory of 2568 1732 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\B738C981EE80FEF191C95D3D030BA5B5.exe"C:\Users\Admin\AppData\Local\Temp\B738C981EE80FEF191C95D3D030BA5B5.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7039758,0x7fef7039768,0x7fef70397782⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:22⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2332 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1408 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:22⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2196 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3816 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:3008
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fa87688,0x13fa87698,0x13fa876a83⤵PID:2860
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3952 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1872 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=928 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2064 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2800 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2656 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2960 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2144 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3840 --field-trial-handle=1312,i,8766074682083984339,11884146025414345271,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d1e0841e8c76aa6fa7ee27ab46774831
SHA18f07afcaa2f2e0b727ffa70d763258abe149ba69
SHA256bcc8d1091e770ceecc791096fb117bcab8af8189f8ceb524a49a31b99bb9f06c
SHA51279a610d21acf208afb604b8399476b8d22f02ac619938703df96d18668a889ddcc907fa5f9f073dfa9336c3660ae3e18b6e94bda8775cd1fdf49753ae0f21b57
-
Filesize
194KB
MD536104d04a9994182ba78be74c7ac3b0e
SHA10c049d44cd22468abb1d0711ec844e68297a7b3d
SHA256ccde155056cdce86d7e51dfd4e8fb603e8d816224b1257adfcf9503139dd28f1
SHA5128c115e3e5925fb01efd8dda889f4d5e890f6daaf40b10d5b8e3d9b19e15dadcb9dcf344f40c43f59a1f5428b3ee49e24e492cf0cb6826add1c03d21efdec52ba
-
Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
Filesize
315KB
MD5b2e2caf7523078319e4846ec61aa52dc
SHA1e97ffca85b1d87f1f6fdcfd8711f139f7881f91b
SHA2563bb98ac91dc1e94e462d27de6f90ce37b574a61c458568e67e080597f20f11cd
SHA512b72b0165798db604449e992c9ac41a01c9bf4b5bda31f2ec0cc910ae0b51b814a45536fddd525ba326e103cf68f33e2ece7ba752029ade2ab2bb7ff983444a1d
-
Filesize
128KB
MD5f988eaae7b7be45e217f6c0684bbaa51
SHA150fa7867e2d6246d0e90c2fc1692d510ed0b8e2a
SHA2564ed8bff8ce8688c549f3a9673731e629818f83a3e1ca8777ade4f41b1b224c6d
SHA51214161a97b28bf455f770ec810967a708d48cd4d3d5c76d525f32ed4ad4930fa2614f0aea6f81c8687aba028ef90bc5b450eec3672830c1a174bfbd8ef7b668bc
-
Filesize
75KB
MD5d11d3741468264c6cd339fd91466dbca
SHA1c1939db6c518d7510151b9141d202571f00c3dfd
SHA256a984e5408efcda6218d935a92e7a4483f37df25bbc4aedaf4f50a990717c7e6b
SHA5126ede49da99e39265e19768e380c77c4f7419760b387a539de1398afe118fed6d8409749250258490ab4ba2ebb3b57117d8b6a1ea21e2ab2b3e4fffc2e259ddf0
-
Filesize
40KB
MD51128652e9d55dcfc30d11ce65dbfc490
SHA1c3dc05f00453708162853a9e6083a1362cc0fc26
SHA256b189ff1f576a3672b67406791468936b4b5070778957ba3060a7141200231e4e
SHA51275e611ba64a983b85b314b145a6d776ed8c786f62126539f6da3c1638bf7e566c11daf18d1811b07656de47ff8b50637520cf719a2cacc77a9d27393fc08453b
-
Filesize
168B
MD56aa05185df60386e3f6f8a500e3634ad
SHA148b8269b5494137776916eba1d07a763dd7cae21
SHA2562e14167e08fd9bb3522be4cc1f6db3680883b4ba4bf367a8f60fe07ebc506f06
SHA512cfe2ecfaebdcb587c69535dd5f9881ad163ed9cd2be8649094b9219c1c05f4fbb353d7cdafb9da2cf2613ba56504f8f985cd6cf26f9d63e79384079390a955f9
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf77b2eb.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
200B
MD5f749d4e11099abafe57423d3e79c41d5
SHA197e2965e1eb753c940032baccedea654b8a10324
SHA256aaf599d50c6a1f922a261372da13157850f1ba185d09f80c929e690ec3d9604b
SHA5120f508a79eaf40fdf285777f034edc18d9b10f6423508b68a586e9e09326d158e0a4d50c63702714d495cb55b7ab9c2f0917cd023681218b96a9be3800aaa7c1d
-
Filesize
527B
MD59d263359398135951dddfa96a1ccd4d5
SHA1ce2ca222bcd36c1e4b087778b7148c68f7e1af96
SHA2563df061a78a85425b06ca05e00d12057ca41ce8bcc9d3b77faff9737e2058c4f2
SHA5122f910e439a7d3ab554a269d18c952f7fa37d7bf0b3c8ed9b7e2165efa280fc61ec19e267f34d67d60712f6a0d351beb66cd8811b4108ab78c533da4f5028d4ae
-
Filesize
5KB
MD53104c79541bab473e38ee19a87363ff1
SHA16f2517cdbf9f7644a89393a6280e366d4a486b08
SHA2565396a6704084a0fd7197bb8454c59e47aa75223aa85de40d197c17e8eb07023b
SHA512f08b4dcd6b6019d846854f09cf2a77006c9e3cf824c67d2b61a0329c98dc873f25ae8db997ccad5efc8fbfd54c69a2825626bb466529df43b323384e087177b2
-
Filesize
6KB
MD52b6d630328cd09994c06c637e10e39cb
SHA1308f07bf06d16248507f6c809c3b2a65eb405326
SHA256707bcff2e34fa2f65b82617fc5276ca18cead40d024e80d78a2986d295bcaba3
SHA5125be3dd6866a898bb700c1d0edacf63e221ca8ea4fb87c6bab36ef17407e1a26f09d4a4c76cbe54214344336bf72100f42fe8bc0731860779517f7be92cb693c7
-
Filesize
5KB
MD5ab7d783cfd9c5f5f7a3a9cfe6e7bef79
SHA126324fa8dfcd7d53d321541bd5036eba30983f3d
SHA2565644e05e1ad7b3c6c36b5c3ed1b9150ea698f7401dce03ab041cd69a76486b95
SHA512b8b00b7abd942a978dbc3607c2baa88d1978ce5b21e10b4840293a4ea0670d50c21aa74e4d31ed3aaa399f2a68a986f9dd8748344d7c52488c754656f344235c
-
Filesize
6KB
MD53e9550b974e814d4fac042b4fd5d8ea9
SHA163ea5f1ce5ce43f7e5a9935e46f7bad92129935f
SHA256e98023e39b82fe6b611ba6b344b2aa6e24861bd9c17fbd7a950699b86e3156f5
SHA512eaaeaf11478858af1e63c12b4c2e46da235770b12b3c2f25edaaa3b12c221848dfa3c34199fd79d03a092e782f43ffeb82acaaa1116dbbea9e54e104781f6f66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD5186006f8e98a7734048b97b27fd94c20
SHA121f4e6e19f1caf253dbc2a519a55d05edccdef09
SHA2564d974529519af2b82983c2c0cd46a41d986c21969aedd817ae62514325625fcd
SHA512e72a824da6e4a3a5d3916e40c61968ecbeeb428b789f30208c9113f6fa55adf99f4c0fa06c9796e8f2f68fcbaba2e633f045cac6d827a08afc1e7bd9daeecb67
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
128KB
MD5b763f1742c66b6590fa15798f1aec6d8
SHA1842cea310dfadf2a13b102dcf4437148137bf660
SHA256793618b9906e0cf098af696341bdda5008255c3260b5e1c12804727c236d405d
SHA5125186ad24b9adb0666fc9d6778f62c1cfa0406a758dbb5031a856d6eb10d30d1493c71772a885ccdb04f3b6d5e59b402955c3f121aa091128268c7f366d0a9e45
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06