Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1GorillaLocomotion.gz
windows7-x64
3GorillaLocomotion.gz
windows10-2004-x64
3archtemp.tar
windows7-x64
3archtemp.tar
windows10-2004-x64
3195efefc38...t.meta
windows7-x64
3195efefc38...t.meta
windows10-2004-x64
3195efefc38...thname
windows7-x64
1195efefc38...thname
windows10-2004-x64
12b537a3c88...t.meta
windows7-x64
32b537a3c88...t.meta
windows10-2004-x64
32b537a3c88...thname
windows7-x64
12b537a3c88...thname
windows10-2004-x64
13b0b8d2763...t.meta
windows7-x64
33b0b8d2763...t.meta
windows10-2004-x64
33b0b8d2763...thname
windows7-x64
13b0b8d2763...thname
windows10-2004-x64
170e84f0f51...t.meta
windows7-x64
370e84f0f51...t.meta
windows10-2004-x64
370e84f0f51...thname
windows7-x64
170e84f0f51...thname
windows10-2004-x64
19a3df7b827.../asset
windows7-x64
19a3df7b827.../asset
windows10-2004-x64
19a3df7b827...t.meta
windows7-x64
39a3df7b827...t.meta
windows10-2004-x64
39a3df7b827...thname
windows7-x64
19a3df7b827...thname
windows10-2004-x64
19fc0d4010b.../asset
windows7-x64
19fc0d4010b.../asset
windows10-2004-x64
19fc0d4010b...t.meta
windows7-x64
39fc0d4010b...t.meta
windows10-2004-x64
39fc0d4010b...thname
windows7-x64
19fc0d4010b...thname
windows10-2004-x64
1Resubmissions
19/04/2024, 11:21
240419-nghrwsac95 3Analysis
-
max time kernel
1345s -
max time network
1745s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
GorillaLocomotion.gz
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GorillaLocomotion.gz
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
archtemp.tar
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
archtemp.tar
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
195efefc3851c8c42ae872c95ce8d146/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
195efefc3851c8c42ae872c95ce8d146/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
195efefc3851c8c42ae872c95ce8d146/pathname
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
195efefc3851c8c42ae872c95ce8d146/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
2b537a3c882d5bc4291656af32de9fda/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
2b537a3c882d5bc4291656af32de9fda/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
2b537a3c882d5bc4291656af32de9fda/pathname
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
2b537a3c882d5bc4291656af32de9fda/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
3b0b8d276349b7944bca71a3166d2dff/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
3b0b8d276349b7944bca71a3166d2dff/asset.meta
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
3b0b8d276349b7944bca71a3166d2dff/pathname
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
3b0b8d276349b7944bca71a3166d2dff/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
70e84f0f519a82b4ab283375fff56b62/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
70e84f0f519a82b4ab283375fff56b62/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
70e84f0f519a82b4ab283375fff56b62/pathname
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
70e84f0f519a82b4ab283375fff56b62/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/pathname
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
9fc0d4010bbf28b4594072e72b8655ab/pathname
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
9fc0d4010bbf28b4594072e72b8655ab/pathname
Resource
win10v2004-20240412-en
General
-
Target
GorillaLocomotion.gz
-
Size
11KB
-
MD5
00868c9fd9a235abd264a6dfd1989442
-
SHA1
bfc26299a36d8c914b3e2dcfe5fb9853e8489feb
-
SHA256
fd25f6525440ccb59b3d8bb0a69d673f78f761c21ba456f4149fdf3de4df2d82
-
SHA512
e77b3f4264a2a69828c3b5b929c10ae72a6f6a0cbf3f96f8f855ca0cf72207ac1bb50ef68f225d1f3514553713c41c3925b6213da3a093901c27d4ffcd2547d8
-
SSDEEP
192:CB7hd5uc/RZmkBluqzhyuGldQ5bOeWRo2R2i7ZlGp4CSXJzWwilyB6zz:oBuGRZm8BzhyXlO5dWRoBiOpYXtlSykX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2564 7zFM.exe Token: 35 2564 7zFM.exe Token: SeSecurityPrivilege 2564 7zFM.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2564 7zFM.exe 2564 7zFM.exe 2564 7zFM.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 2564 1012 cmd.exe 29 PID 1012 wrote to memory of 2564 1012 cmd.exe 29 PID 1012 wrote to memory of 2564 1012 cmd.exe 29 PID 2948 wrote to memory of 3000 2948 chrome.exe 35 PID 2948 wrote to memory of 3000 2948 chrome.exe 35 PID 2948 wrote to memory of 3000 2948 chrome.exe 35 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 1328 2948 chrome.exe 37 PID 2948 wrote to memory of 864 2948 chrome.exe 38 PID 2948 wrote to memory of 864 2948 chrome.exe 38 PID 2948 wrote to memory of 864 2948 chrome.exe 38 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39 PID 2948 wrote to memory of 1700 2948 chrome.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\GorillaLocomotion.gz1⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\GorillaLocomotion.gz"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2564
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5f39758,0x7fef5f39768,0x7fef5f397782⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:22⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1420 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1488 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1812 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1820 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2188 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:22⤵PID:304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1344 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:82⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3804 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2016 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2988 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1612 --field-trial-handle=2032,i,7101361515548786184,11199882191437596388,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2092
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5481⤵PID:1924
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1532
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5bec71a9bd78a8fbe001657001cdde563
SHA12e367310a8ca5de66860054f682e17407d6be355
SHA25696970deb1003ac666a48c5b54290246c9c4e5ed9524970af7ba404d5708d7f7d
SHA512a1e9334e6246ed3b98936dc75acec6a13ada2dd94e259b8956ecfca24305a0ae9ccf5b7025e44057795bc5a2ae25c2db53da550887b5c02bb8cf21d6645ce43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6de4874a5faafa72d6839b3725e112d
SHA16bad48e7c2e5c9dc8c71e2ee38fbd46e755cbf14
SHA256c753455682cc8b6973624ea6769fc1285ca722ab45c8fcef27818cb55db09459
SHA512effc411775e27b2c7036dd4365e00ac4f7870307b1cd9aada1d0c4da1a6189c179b9bf3222e39502331910f8f478a6bfa5e664a8cbff6dcef912f935d47bf6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f756adb14ea226945a2d40c382af43db
SHA187b0814dc99c718024011e08b2977dbfcb9a2180
SHA256d08ea8378b2232c8aa3aecbdd77866d0c583f91a97942124d1572d8282d7eedf
SHA512f469390534d03ef9d48cff6be80d5bdcb560b193150e755adfbaa31f4c7c3ac8ac425433e6b9ee6e56c19e392008f14479c1a5f580270134d245d1090c594e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726f27176ac6cb3b0b67b9182969979d
SHA1b9edcdf5072d5ea1facfcfdbf11e49223edb3d5b
SHA256b3e9852d4a0076a11f1f33bc4be49d192f13c974bed167a18f3e2ccee8096e50
SHA51290dc75bb68520a0f867993f2b9e74efa749c96efbbdc3777d8c0472ebeaf1d53e7aa518df72892322f03eea9e87b355f568024f1086baa6444c7fc027df6dcda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac333a2b8d01e913e411108489c5380f
SHA135250eaf00281291f517e01ebe72a41218f5570b
SHA256203cbc952d3ed04c9e04f6cfc413384329712157364ae94ff37c40a0d469e0cd
SHA5128199ae897a9728344ff74c5211d1c0f23566ae9c159e372f852f09b843e7c0116673d00ffd1f04ce14783f7924869c78f9e3430ed732dcf1fc07e284bc339b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141b71bd4184ff3810a057e49d95e6d0
SHA1e537306be8eec7cc8f7dcb2d24f06575500d1e56
SHA2568508bde6f71eb9fc59421d4d6ef329261e18e86cdfc8e6311cb497a83afb69a9
SHA5127e14a0e43a6a3160fd8636304fb469c9a1551961849d9bd9b22f9cd6b70c5a7b454675e633a1c7e33e528ab2dee4799e110ed6dfcf0980f0c37e68b9b6a48a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516b5ca388bd7ae8c5f09bf4b00f2dd9c
SHA14d871f6526fdf9a6d5823d2e7c4bb9b36d5da37e
SHA2566e8eeb061dd7b574bba281661251c3b1a1484e3b70db08b2019caa821f5ab3ad
SHA512e31e3f2f01280ace1de8d88942f7a161826c0febdd24701e93ca6589e44523ae791e957cd12dfbdd65ca14a5f7028e88dc71a4557605ac7bb5b635501818b549
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\51a896a3-265e-48eb-bd85-e73b117199cb.tmp
Filesize6KB
MD593d73aa41b41b4d7170594ef926080df
SHA1eb37780f8de0ba8ef5725a3ce356935fce8706f1
SHA256aeebbf5b0ed6635d84e215786c8167c5a39ed7277e06c6cd597b7dda39c682b0
SHA512740ce920c85944a5b00e061075803a14d04d5e720d6a72e1176abb01bb8afaa78161c6bc8a15b012749b1ae71142a352ff4f33a72264d320e1d1a5477404ab07
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\0dddb4a4-6891-4c9b-8cd7-b96850202de6.tmp
Filesize987B
MD56765bfa23720c02c91593c964a934cf7
SHA1a8efa96893cb74cec8071db61b0d917499937569
SHA256bebc6afa5459d203d9ad6df258d056861ce35fffa67bb59d514cc8069c8b175b
SHA5124f3bcd6375575a5ffc7180c1ce65176783b84db511f2a6b2552b16df4332cec7155467e2f099c6fe74b9a803eb61f6a91ba18f211f64c694d752ef2ce03f2a06
-
Filesize
1KB
MD51e6f255adae4feaaa9f7d13e70a09f2c
SHA179fa2545d904d0c602b4a03c1f1f8a60b2c4d888
SHA2567773869557eeae61fc93cb12409a8e4c264060c51b7038375ee9bfdccfa82edd
SHA51295c9b613c4673831ae81fb6013a0fd58a7896ae377354fdaf0b8985fa031c3c8e2c60c64a176727f8961ab81cabab6272d7a535e62c9769341d6ad25d65067ca
-
Filesize
3KB
MD51e23c1d483dfe71bf40f559d60e4402c
SHA19c416102d8d06464566ee9ead3fb5665073f2234
SHA256aeef0c5f5df4ed93d93b2c748dabbde4f14372dd5c298b417f9d04880ee55713
SHA512156f6070bfef91235a5dee0024d50362fe51a8751897adaf60a73fec420258a57ad2a24aa28434f45835f6b18e68026ee232f816e3720e3a45f943c4402da5b7
-
Filesize
3KB
MD5011261c4400380d0a78acdde3976166a
SHA16c19b5ea367fd2ecc09dc1292b494c2ee8782b24
SHA2566ae6271d3795b8cad2c0d9de57161528a60fcc26b3c472866c2d06cde5a78ec1
SHA5125d6ae17bff4ea0620e7d158cadfa7368d598e4e7c9edb0df95f1494122ea4931f7e2bb20a9540a3a173cd0082cd3466db497af300dbd95a95ebb8bee26f9e721
-
Filesize
1KB
MD5098ec5aa279d667333ef37c21d5b9b70
SHA17d2a5458b6e9058e52f5a5de9c07f12fa0374529
SHA256669fb3e9f62d46abd0afbf387bdeb5ec493f92742864a6c8e1de5f9f64bb33e7
SHA51201abb697d209ce38ed4d9040ec789501b1a91705b84cef6f9fc2a59bc2de738e96a709da9440e416c0522b77672fe28d9fc268235e70b6901664e47e2b7bab32
-
Filesize
361B
MD52abcefdd4101c0e786b8c1d18dc81b67
SHA193986a021eba84ba47e6ae380e6ea5fbfd336ed2
SHA256fc22a06984a0c6957a46c17732b5ec2c5fc9b315665fea49cf516d62529bb3bc
SHA512cd5b7101b5c285829a25e3e34dd4cc4016f8286b8520219fc6592f14b245a505dea03051bfcd894f3562656306e936e63f7e7cc798d9fc9ac14a88c8aed1acb0
-
Filesize
1KB
MD5efa19ba112cac02520dc6c0da79c503c
SHA1fc170ef3d92b25dfed343ceb1758cf77398efeeb
SHA25671a1cc226e80d2acc3e49a9f656e2b769455adf20d97b75a632c8764ff8c90a8
SHA5124d8cdafa8a3c5ddeeaf48e0d147948697447df3e4a0a172bcc7f673dd880a081f75e71ad84b47e11c981517be73018bdc78576634fcedc03ff8f3bdd5b581901
-
Filesize
1KB
MD54d0a578a994a22948f380046fa756bee
SHA195ae58c8956a1ca3fd980f764e49e0916da86d52
SHA2563c69149c8aa9218c3f8182c8702abbcae3fd3ce63d6e9b24468b5c79699996df
SHA512739c8c4e0854bca9b14c8c5d7f179722ec6c98fc35002e27c716d8a438f22daa3096909dadcb1c2035d45856af30d8cf13337d0b522d24c5f21f78d0ca202fff
-
Filesize
687B
MD5ffe1d496469be031d24ec1de8436a2c9
SHA1b6cc83f5ea3caf50a40978b90a9de2ec5a759a38
SHA2566248e73177253820d6ef94ffcb160e7286baeba271ccf1cd25995f0123882f6b
SHA512bf259a27a25e6d6bae1b32e9559e16f4ab250e5aa3e253f5077e0ecc4c4157ca255b64b19ab153e633b7ea1ddf40b2735b8b65f8bf355d5bf74b211a4858a10c
-
Filesize
5KB
MD5a95cb7691b1235d55f347d85d420ff9f
SHA1d4278904cff9ddeda9253b064c9a75869a84d7df
SHA2565b8312d630502d7e813cc3a7996558175074f2a55e80bd364d3661d5636ea584
SHA512604aba87a729e6bd39843e5f4f85da406a52458ad38a4c96bc953e73aff336f155fc8c4cdcea6ff66f507a861f124573ece74e87ff46795fa457d13ff75d1fb9
-
Filesize
6KB
MD50944751103559ac6c867b4096edddd86
SHA181811129df6b65d3c4a3859bde9bcd2041ed948e
SHA2568b7fdb46fdcc83c82617f6502a9fdf52c0ad4dc9d06c5d6ab5754a1b663ac04d
SHA5123e7257ae9e1141d5ee812fddaa9d1fc6519e60bab824a0a1d3554db73d8415d857a146bbc0191014529fd13ffa1c782fb6d30e666f43c2c386704ccc3520a60c
-
Filesize
5KB
MD56a88891ec11023e94d220e6dda535a52
SHA162ac0b2b4b7926b52b03dfd6e7e19432b80675de
SHA2564d48379a96b3beaf6831663f61b341daa1354527cb378a464745e0f8d1b1dbee
SHA512372f4253a3c4c41140fcc2d1d7fa1ba9393342048cab5e013bffa09253e29de60e2ad1ab0f5059b7fd8929d44858b515213a46e865102d5c24bf582450358a8c
-
Filesize
6KB
MD52218b1dab1c6989ffc3de9647c61346b
SHA11c414112b0513c93d1cd59b6e7a7fc983e504267
SHA2562c6605b5ac8c8678a680af136563e994b831eaecda218c0018655b437c14dca2
SHA512a060d1264b122e35c0e854eeda5388cb1f0c8a23df605c03b05f73bdeb2468f46db395ed3b03a2b8c99f115a9d5a65e843fc37b00b3c5ec8bf7e9eff8668a40f
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b3c7b72e-2c58-4b36-be77-4d5bd333c712.tmp
Filesize6KB
MD5cede48566e91ff6a1aee43f3d035919d
SHA1c684eaef6f65b0975818a3a9929478545df6b394
SHA25699dde97fb3de9efcf487b820427bd933f87610d17644acc86db9ab228c0f3215
SHA512336561e7f14bb5bb7efdc6f61a9b72d691128c1b038d95a7f8e611354f8dbd3883b24ca7a62dc442c5f7e48e36a130c323e8f1db945ca14452f6e4207f32e5f6
-
Filesize
265KB
MD56e665a6ca0eaa3df683e824ca552a2e5
SHA1806ba2470f880217f58b246fd694e33217e129fe
SHA25652d0a97f3e26935f548b832b78fac822e87f1e5507a3d8662d86b851dacebafb
SHA5122f33bdc45077a7ad88739a850d00e9abd8704ac159cb5be0d7c8cb7089fe239775de11343d252da186384fc1d8e53f0a689c163794a14d1f425005976edb12b3
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a