Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1692s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
Update.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Update.exe
Resource
win10v2004-20240412-en
General
-
Target
Update.exe
-
Size
1.5MB
-
MD5
28f41e3c6b07465128bde253d66164d0
-
SHA1
e4f1e108d30da01be709882e378a4b42c1b21e19
-
SHA256
85da3ea63342c060f421988ea402e40091035fdaa5e85e93a62789a4740b314d
-
SHA512
1c0633ced4076005967a01712450e73c18618ef983bf37ffa804ae10c822fded1ae55260e02c2175ced130cfb7825bc5af35072156295a832f8cc53bb7e4d43c
-
SSDEEP
12288:L6CyLEgR0ro/0EhcXAHjRYSN9bUlOr/oJfT9Pu0XejfQ1JRQ3Tzvx+nDIpnU0r:cEgRN/th3VelBPu0XUfWJms0pnbr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580798215149368" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 5480 chrome.exe 5480 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeCreatePagefilePrivilege 1304 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3240 1304 chrome.exe 96 PID 1304 wrote to memory of 3240 1304 chrome.exe 96 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 2352 1304 chrome.exe 97 PID 1304 wrote to memory of 3956 1304 chrome.exe 98 PID 1304 wrote to memory of 3956 1304 chrome.exe 98 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99 PID 1304 wrote to memory of 3296 1304 chrome.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"1⤵PID:3888
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfd48ab58,0x7ffdfd48ab68,0x7ffdfd48ab782⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:22⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4320 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4512 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4160 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4744 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4908 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4800 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:4800
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff75e69ae48,0x7ff75e69ae58,0x7ff75e69ae683⤵PID:1604
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4808 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5024 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2412 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4796 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3196 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:12⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4932 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3188 --field-trial-handle=1900,i,11547356852665451391,13482156398792311467,131072 /prefetch:82⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x474 0x5041⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\50eda20b-b2e0-40a2-8512-4a32a334f2a2.tmp
Filesize8KB
MD53be648f93a676edf5c2a2ef70a8ccaf0
SHA123c3c9fe7a057bd373f2f94597615b270e9974bc
SHA256fdb0d1be071beb55e3350f41bbd8dd43ee86b37ec59b1ead966ae96b605cc940
SHA51271d23787ac10c50ddb27b7993d77cfcf24c18eef30e229cb857d2ed84c674c3edf541f01deac2c56fff1e859b047a2494cda3c2adaaf8cf3a848e955db04acca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7727903f-56b5-4ef9-b37f-ce0b0e03efcc.tmp
Filesize8KB
MD5bc39733dd4613b7e2bba60c067b93706
SHA1f426753ef152eaae1308240cad09e1f806aa505e
SHA2569733d40f207084aaacf461cccd1d22c4d0a47448d2a81bf9a1c2299966f9f829
SHA5128040b0365887681ba01d23abbf30810c849026f2049c6c0b86c1c6ecd063faf35ca716f422e8517f8847b7a4072cf00d0c9be3fd88cf5d099fea60efce2b5ac5
-
Filesize
64KB
MD5a1958926b60d2e0e216a7cf0d2c264a2
SHA17c00bedec8a97c9529023232ec9e91835d9bcd12
SHA2567ac77390719df1ba219e84d2ea25b9c9d51d56c7772f0ff68a40235c954f8009
SHA51289bc122bd2d2ea51382bee8122118a63bfb1627d29af9b4ecf32e956b9003dc93e64494787f114f1f86be25834061da664e7ec74340452428ffca823d5b23414
-
Filesize
27KB
MD5d6f862353c2433098d82725f90a0e280
SHA155ab2e7e58fd35c99aec7fb52849d866eaefc438
SHA256719a5b617534fb3a811c51a999f943911439fb43225e3a38a79dfb9c0ffbac38
SHA5120de7c8478de4d63e2d49e834c5ddc7e6190dfa851b46914f32adc392c1b9e22e6222c01950738985b44612b65a8cdfa6ddd99e77c49e1d6b9257c63af974b178
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
76KB
MD5d9a4d81125ccb1d13d19d74df0a818ac
SHA10deb4d1e438c11c25e0107bd96a8cea76f42cc9f
SHA256df0fa8ed66132c8c2ca457a843e7334835cf2a081850c2f811ada201ad0d0c61
SHA5123808abcca78478fcf4a08580fb18c3591d900d89c27f8264b105a265d787f4e31779af0b2f1cdc9d127e4f2a6115ac0aa05d3660463127a2f1157bf2a5b0c082
-
Filesize
93KB
MD55320f6e3a22dd59b227eb08a1ee26f01
SHA18e4f9911ee15deceeb4d6837e4dd774d57999ce4
SHA2562b27a34ce36216299c3b98d6078ae50f38838b13dbbebf3d468b8785e2b27add
SHA5125bc64b3f73306002682c92c166d6f968688625d2ff26c2b3da1f04a618610b65672f72891f23a2fab8d0c7be8b88be4021554238d89eabd7715807c1a7b6a7cc
-
Filesize
29KB
MD5f85e85276ba5f87111add53684ec3fcb
SHA1ecaf9aa3c5dd50eca0b83f1fb9effad801336441
SHA2564b0beec41cb9785652a4a3172a4badbdaa200b5e0b17a7bcc81af25afd9b2432
SHA5121915a2d4218ee2dbb73c490b1acac722a35f7864b7d488a791c96a16889cd86eee965174b59498295b3491a9783facce5660d719133e9c5fb3b96df47dde7a53
-
Filesize
60KB
MD55d061b791a1d025de117a04d1a88f391
SHA122bf0eac711cb8a1748a6f68b30e0b9e50ea3d69
SHA2564b285731dab9dd9e7e3b0c694653a6a74bccc16fe34c96d0516bf8960b5689bc
SHA5121ff46597d3f01cd28aa8539f2bc2871746485de11f5d7995c90014e0b0ad647fb402a54f835db9a90f29c3446171a6870c24f44fb8bbb1f85b88e3ade9e0360e
-
Filesize
110KB
MD597bdeee293d3ce28b917677ef79df0f9
SHA1baedfcf300e4c3da58399c1dbf425f1ee0c70dd0
SHA25628e08cd18f193a2bc38531f6efae39f1d35fbec8aeab2941725b86d32696bdd9
SHA512064baef677a586d524288e6aff415d53e22c064eabd5a1c10f9b8472a288fba59c5c06bff3b8e45be9f47f02b49f471c1de68befe496f2181bd32ca63f4efc6c
-
Filesize
316KB
MD509f1ce3ba0fe324d0b04b535eb8da40a
SHA19f03ed4e5fa6d5882362f99e6da71adae079b4e4
SHA2566bb30e12a08ebe7707d21cebd89f24c61180ff63f346f2d9c86937e8e5598913
SHA512be5cc45b11ba387a150001f8a5fab1154551b28e6b6171d137c824dd9764eababdfe32c2091636a4744515343c311936fc51751c8b3e32a2aba061ae51cc522d
-
Filesize
28KB
MD569a0a09343085448206b4a8d354023ad
SHA164b4ca9361ad77062f49c646ac2d80b35c41d787
SHA256d3becacda54b5abd340d57c71c9ba5650be3b815be363c3b4d61024c948b2925
SHA512c8fbcdfaf32164f0f603fa1c7dcccec97627582fa51f7a6094fa43a9c9bfa8970e5197eca974ad09a9ad704dbf0fea5b3d7f35d7670d9198e273ec5eac537497
-
Filesize
41KB
MD51c723f93a52c01ef152971bbf0d7527c
SHA14ecd5ab4c0f57fe0037e22b881c1e1c13fbf2378
SHA2564c815b2084182793cf9c2e6b5e4fbbf384d5cfbc94868299fbc6c199d98b79f8
SHA512e87479ca1f24a1e1bb9b57606a986e69fa695cdbbb91d8ee564622aaebac7e6eff195cad6c9ee4fd6343bf96c43c005e1189b2e1d5af9854e3657b9af05a8aeb
-
Filesize
1KB
MD57654f4c9c0802340641a0b33dbd7063f
SHA1b40629fba9eaf9f451ef86ee116eb7f23520487b
SHA256020f4f54707352deb91499fbdc825fe9ec359d7c9f8c227053328545d3dffe0c
SHA512596070fc9958c436a69d51b3d242f6c13233afb6dc93820661e612d6d255fd9313f6281ae99c29fecff88427709e8127bb81a2f20d7eee29084140a6e35e58d1
-
Filesize
1KB
MD5e1b37d545157003e88deea98eaa1c745
SHA1141a6f08944dea1c7b903ff026579871a62ca080
SHA256dc32f3966d8909d08565a47f63d4328e25f44695fe07398392db980aa421173e
SHA5125622601b65331443ddf8b2cd8f295746e9cac3db5d8b6c3ff429a889c9fb80a63d116a2b53c10df1a9db969a81759f4a376df7983280a571c0ab9d74e0ebb6f8
-
Filesize
2KB
MD585e31e153c195f714003d1bec6c1faa0
SHA19c31f501bbf0cf1f2ace99cbe591141abbeb6ca2
SHA2567c6ebfae5a38e8a82901c84d979d93230a2da7100a52e65032038b0682b5d994
SHA512f374f29b3e1babcfccce54af3cbf897cd1dd9be3245ea953205d8a0348fb682b4dd67a8dce5569da3e1f29fca491e6ee609fc1144479cc7ab0aba84e6e5fabe8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.xnxx.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.xvideos.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
5KB
MD5d480368dba755288c0f53be377170467
SHA1594241e3efbbf55fc65e0ea4bd5339005d0f6775
SHA256420722f16fa5fdfb532f7cd04e61dc40a945b8c37d558e1126335dd3feb460bb
SHA512dce7cf04f201b888c979e99fc1fe92dd6d33661d0421bf8238174d3edda2d35dd514235539d5e1325e1b352d5bd43b85bba1e947988c543aa20aadf554640fad
-
Filesize
3KB
MD5c9f77f2619be70b64437293fc0f9639f
SHA1185876b9df49f39c51b7eaf7e05353d1af995ac3
SHA256999f84c0e9596935c67954857f41c2cf64cff4822e78ac39ac0a66fb14d6b247
SHA51252e7e886254d4faf8b28daf8b3a57a2a40c4b3f32e8284acd5f2c79aeb8f05eb1340e8030b313ba6bd7eaea3f457c831dc149bf880a9d5a4acca0306754e3773
-
Filesize
4KB
MD5ed1b6251cf30bc2e944c8faed51695c4
SHA1e22bbc4a2ad19c381b78778085cffd28a9c36379
SHA256803787bcb8855cf05efba86381cadaa93c76148efb20ff46218208930876b9e1
SHA5125535ef0ff6ff9245ca2650fb7b641ed157d49e72348618e49da0edb742039f8c871280d713d8071a9c752440329a6becb9aa857afa3d628cb36e2b673298a31a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD57e77fa23b4c41ec653578325b880f62a
SHA12a7732588dcbb3552350f17e2b8a5250777df16e
SHA256f2418c3007b126138d97f6188cefbeb5de93e062620b2c3b35aec87b437d8113
SHA512524e4fc628bd0aacc74067ceaf4f47ec904095979e553b5cb0b5985ccc31f80bd0173ed755cc5f6cde7b17ff01a0663e3c8f6ebc7872f1a8d6864d075852dbaa
-
Filesize
523B
MD55d145ff9def8c3106b8713ab6cdfe9a8
SHA1db7d059193b10c68b7b75455dde1b46f161f008d
SHA25625cb570d9d30bfe5871f2506d8bba50f75d7d44efa96011470c68fbe6fb762cf
SHA512a8e0d0d189fca968bc8d4c5b19f54b09220d812401096c4805d1e2ef8f11acec35366e2093d2b33f249ca1d6c0163ec5e0d66b0a9c5bf7cd9ea3bf091cd02765
-
Filesize
1024B
MD565c62dbd2054a901c52bf4b61ae9b9c3
SHA1b4e1b0338322d43269c45a3ad853a2f55e20c1d4
SHA256b50e5667818e978cbe334102bcb7ae5128cacb11c0fcced4c8cd3170f31250a8
SHA5121df204e47f4430bc1b0d8e7d79a366ea0f08accabf4dbda49c3cd946727af05039f574195c7b36625f5443e1ad83cc4d02e588d3ccac2ece611be84bcfc07744
-
Filesize
1KB
MD517455ee111c4a1cc256751ffbf67fbe7
SHA1e2995daaeabef7505e5a3900972ff82b48a9a152
SHA2562b4ae50bb356d8025988164c4e39713b30b9801d0c31c6164fd9582f89d50c39
SHA5123d60b2d27904a8afd99e50ce56457331354b0e2701760014015683ec615d73d797d7fa0d9b38bbaf6838fda1b91a0ade25a73cd71bb543ee1f7ccdd498d7b976
-
Filesize
2KB
MD5dabdd49e434c6859ca25abf207786e61
SHA11cfd21916853c090ab05b02b8747357927ba0d65
SHA256dfa64ec067c2ab14cee876c2ccfb6f749c83344aa8a09187e8e1000886218df7
SHA51280a054377b96b93ca5c84de8ef9843e3aeee062b551eaeaede790fb6830c9354fec20bcc3d89617c0f93a63b248945327e500c95b410cdbbcd8295636c673477
-
Filesize
2KB
MD5d023631868d8af2a0fa12239563c566b
SHA1ca1fac697b6868bbbe5d0f6399aecba32a534eb1
SHA256182975972083decfe92e6fed460d7c49104b7fd6c9b38921a11f816656f5c322
SHA51284fffb29fff3d59387bd62b37e6786c960e01c24201fbaf06c613d2177ef2a243d94e409049e8a012e35ca06743bf899bc730737ba89e2f13f954baa09d26f21
-
Filesize
1KB
MD544f4484866d6598079746b289f751464
SHA169f3e353a7dedb3598db94712360eec26d5a026e
SHA256bf3db9395608bd29eef89c385a8ec4edd9ae071c7c62e341b1c083d756df33cf
SHA512323c96fffbf0e983a302b6e67081307f644a31fbcd2b1336411a5e1b46a1a09031c28ac74c758bd158e8e5cc7d35d1ded7938eb8bc7fbfa27c3afdd9315618ed
-
Filesize
7KB
MD50eac4d719b190b4f73e8c9ad6c01f8ab
SHA1d2c88f22abad3a05b2da977bf8d25981819f89e6
SHA25690600c96170aad646289c9851f9bf9e8bd074f6ae463b04623c5fdda5e582265
SHA512b504e3820a9f646956fbf114d3a7965d0e4d702e5334f049902921b4f48317c67fe77b003d00d43d876a53dadbc3ae5830044ba861b06d3e9624780eb2a26f98
-
Filesize
7KB
MD585f373abd7542bdf674b3327761b859c
SHA109d174639f3b3cd710ca63da1b1ec8843672c006
SHA256190de3c05886d6b6294e631551ddcfc2b977f3c37d3759f7ab2edbdc30083d95
SHA512dc06fce58586c036422df4a28713b81f2e923ed82168c22f850259193334ff73dac91e664a4cf39c5b1fd2b49d1e96af804ae6bebdabddcda7768d546ff51bfa
-
Filesize
9KB
MD5f1b75a299585d1cd5531903ef3aef5a2
SHA1a589052cb59db0ca0fdd30894793f762c19b1248
SHA2569d03f92d82bd9aa2128c570195b81e8b983bb4cc630333e5a2624749f9b36d22
SHA512492d136cf13937730c25b48aacd90061b2a708981a33c78f93135a7271f5e4810eae63f09d65655e8fe642d18c18edbbf075d44a3dc038146fe5983f6fe4cb15
-
Filesize
8KB
MD5b74247d53b2f8703b342e42517c184ae
SHA1902e1782b7f74b6e888f7df1856ae35258c02f49
SHA256f7bb8a2569fb340e2cd3b7747d9ac57ef5de1d4a202b7db370782b5e3b909f99
SHA512e9b68654db17255b5184e98b870b58f5f2efa60441850adfe2c011911072213528cd43417af3511f7eb27feb4821ea3954dded883b8c2f9bf4321c5d821bcef5
-
Filesize
8KB
MD5e139730dd09c9a6e7d2ebc3e01319986
SHA13798fbd2d4ad226a8aa259bc8e279d2595b2449c
SHA256cb9157fea72bbf0d997ad2739e4b6738ec68dfcf87d51d75469281c7077854c9
SHA51291c1c67cb315b0301dbdc7000ad6f7649c1cd5f2ec3cca8a66d2759016102a3ccc8ce2334539b3745db690f4e625c586ee6435e7b6b28315c84f77f87ef736b2
-
Filesize
16KB
MD58f8e04a4b66045d6f62d2ee2cc310316
SHA10b4cff4c7a3988cb4ff36bb903505162d3755a09
SHA256defba4b7f693ea634fd2de3f9c374edcb3ec264e1329780dffd50e89ede27e6a
SHA512ccb8e1e94b9003e33f18103020fee8d37493d73b3e4fa03df089fc1555ee27aa5c458a962210eab1d4633f98b01667c064599498f285a93db690b23380b09fcc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
Filesize4KB
MD5ba3b412eec653856f8a7f2ccb29944e6
SHA1e34ec77fcbb104e9b335230531cdc300b81404e6
SHA25681d465f82f07b2ac4324fd4124c5fb9f53eceeffb7bc4dbf93c1b810c92a0eb0
SHA51297513a259b178188d66b97e1ff0a2a9e9f1ebb160ed4ef21ce6175c3e63008af191d7b49737436a849d669cf6b7685afa775237446a7f54925d56a0eb7ef8f81
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_0
Filesize2KB
MD58ef58f49b4297482d8fb4fcaa7d08c51
SHA176e2a62954b9fad19cdf76103ee79c2a14dd91fd
SHA256d21780475c8608577272fcac4aac66279018f100f4197338f11c26f19dd1e9d9
SHA5121e26add172e9b64400b964f1fb2120639a4f0dfdf903583df58008169f19d3be187af4f4f347e9a6e4d19ba708322c432f78b4ab864a29248afb419c7c28622c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_1
Filesize3KB
MD55ae6958b5db8627c0fa1c8020c137dfc
SHA149cca2c65fa3bf6b66a97bcd9a2a46be3f98d0ca
SHA25636f5d62a8e9a977ca99c3d351b04743d196c34105d7197eda58495de1928aabd
SHA5120105f72a51ceefc5d7fa9cf19862281766773bf9058d2ccbd083d0de36d872dae204ff066d7d8369a8fa73f02a75d045c13569f8ef40d72662eb2f7e8a49a693
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD589b6968374bb78bd9ecc66b65c0ac6e4
SHA1a5b7bb14149b30e0530cf1ee5ee5f4319e011815
SHA2561771191d471418ef067e1f157e5b36f82f27f2dda56ade3a5745cee9c9a8ab84
SHA512d1e29d4180abb479928435056ed92e5c7a47679b679658a8f58c3352cc12ce80f4aa53d62f3ba46697ea83aa61ba519d718247d861a43f5532499c49a55762a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d06f.TMP
Filesize48B
MD5582e9433f2b0cb95813190ba53da7de4
SHA1a9dc6f06113063ae8cdda6f3a5174d70e754f977
SHA2564e56dca4097ce46a3b5a73c0bd2e98639f9adb60c775178c5f3b8b48c52967c3
SHA5123664645ca0da996db259caf322456ba0450ad0dbed135ed062e6969cc47224543cd2cd70f54dc5a03d2ee4e64765386277c79ee83bb17a4ec6792378d3f0ef6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a53ec840-bddb-478e-bc82-e67536d9e843.tmp
Filesize8KB
MD54221d6d2326a699b03433c6746a58a4e
SHA17784dfe0e3348c8fd65649955578a24b6e4260dd
SHA256b85c3a439bef84e0eb5ee2b89c90038fb14bc65cc75035e490bedf77815f963e
SHA5127db4bcdc4d33e5d3e8b7031d98f88474fb30b88d966c0f943c05abe8ebb7752a0e9bf8e479f62a4e8c3a407501faa94e31da67e7853347022761440c1473b118
-
Filesize
252KB
MD5404c1a09e69bdcbda2019081763f3f77
SHA12ff3032d555c93abafd7bae7c4e05b82ff21f41b
SHA25679cf7449be2eb128f6e06edb1a32e895aa4a1ea2525b7963a6ac050e05d16b49
SHA512c3b63fbda0dfff556b1e93df17c1a34c3613d7ccf1ec6dc9ec5dbd758b3b00ac96b5876a22314199ad72191fb10cae77386f58f9a4ccce0e517c9319babf3ad9
-
Filesize
89KB
MD5f7bcad3529a7c1f5b46d5d19284fe3fd
SHA1ad9074bb667e9138dfde546f1c7c4b6001e12db8
SHA2563ca9e2ae035a028fc8b227e12eb6ec02d2eaa3b1690ac5a119dadb5ebecccaa0
SHA5126de240172771d907b5a3a5ace3b98f07e31f40829dcaa3aaa4e9e178bd2dd56cee194cbde4c3ac88bd6d5df8d0c0eef0e5cc51e85c91b5f8ffb59e815ed4d470
-
Filesize
88KB
MD5a07344165606b11f9c7e0682911c0e8c
SHA1d082861df04c46a5a49e02708bbd0b413f318042
SHA256a677a7ad91725b9ab45de476691dd70c04aa3188323a5d1e993d4d29ddc1c358
SHA512b0f7de45940c2c9b85a2c822618832b7190140863d6afd7b29ba133a3fabc6b15417fe665696b71e8b681ff090ce5d8bf8accd8a77921ee574763fb70935b905