Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1805s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
images (51).jpg
Resource
win10-20240404-en
General
-
Target
images (51).jpg
-
Size
4KB
-
MD5
97a52a3e24571345c1d01d37404b3859
-
SHA1
d420849fbe4b57564b0edb1c85cf6798bfa74b20
-
SHA256
f298e52d9031a6a9ca94f513c871dd907dbbc20b3d6d274b874a21317e45f0ae
-
SHA512
19a790496977260fe6be077e73e34fd3ce5cb0c52ce3ea6bb5741c51e1e9162c0ae9d13dc743626d69d340c7abf08aa0b9f15d79cc1a727f4ddb843fa095241d
-
SSDEEP
96:surtEx4S6FsznRzV9OOHaQnf8albnbRBGChrFcVyD3Q0oogBlBl:9K4hFszH6Qf3BrhSVyUd1tl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582796785555547" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 404 chrome.exe 404 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 3004 404 chrome.exe 75 PID 404 wrote to memory of 3004 404 chrome.exe 75 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 5116 404 chrome.exe 78 PID 404 wrote to memory of 4020 404 chrome.exe 79 PID 404 wrote to memory of 4020 404 chrome.exe 79 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80 PID 404 wrote to memory of 4148 404 chrome.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\images (51).jpg"1⤵PID:5096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff993f89758,0x7ff993f89768,0x7ff993f897782⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:22⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4628 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4752 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5036 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5456 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3192 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4736 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3120 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4728 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5584 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2612 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5316 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3832 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1896 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 --field-trial-handle=1868,i,3395420567454749134,9340044794047860942,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2188
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c1⤵PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5f5bc40498b73af1cc23f51ea60130601
SHA144de2c184cf4e0a2b9106756fc860df9ed584666
SHA256c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb
SHA5129c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112
-
Filesize
191KB
MD507916d9af8ee80bd4bbeea8823792d46
SHA15cc9cdd893f2e441f96242a97b2d70918c0febea
SHA256bd48d3ab4d00d645e1c108d91711e85ec859e2a796cec5069a3bb0b760f3c130
SHA5126396c63230fcc1d2c2726302b248894be3d3d442468e0bebffec1299dc41604acfd12e4d4c2382b18e59ad59891151c90fbcf6679697a5ff6d6eafe7922ec8ea
-
Filesize
432KB
MD565f65db8bf71f4e9294b8a7f14eaf0d8
SHA1e7191ef2c2d1c9d36f24adec9544ac8cb495c59d
SHA256aa757750200e254a5dc3ef2b0192aa17136eeead3e2d4880933a05e9ad5bb0cf
SHA512c6f3236105d1b6c29151dece4c7017f871122f72b72afcf790c999ec47324375683062163035dfa13307d6e150f3b4a9cf431aa059449827764fc56cab4ba952
-
Filesize
972KB
MD576e3c664f1884cb9a973142e064b3564
SHA1142d5a39ce5fe0ee8b64cc525beaffd8985a6362
SHA256a1a4041b2315513b933c7c269480d9dfe5a8aed002aca21aacf04e1221f37a76
SHA5128b54c3cd00db93007c8d1525d3453130bd2e1e808caa2ae7e39ac8acf1519388b9a33fb34d693f58582b9165ba0c567ea683cf51b88939aa0fd239147e126e8d
-
Filesize
320KB
MD5cfe38b92592b0bf435fea2e046c6211a
SHA1cf9c79304e015640d4d09511a64e0fabfd2d2a4c
SHA256f9ba583d44bc1cedc0bc8a5d19920620ecddba3c0bcded5621720d65129009e9
SHA512650799aeebd44e5cd2c4ed0952a9aff553afe84cc1b3be1238a233829d033eaa239222b1cf5a99e4020b8ce08fd6608e992275527225991bdaa55793531aee98
-
Filesize
692KB
MD5c841f1ab2190bb68a8a206c23d956fb4
SHA1b5236804e7bf9f625f2ba8488de5d57fb717b9bf
SHA25698b13b04fe041186ece7bc037a31c31a654ebaf6e4b8edb5e9cb5cd119e7d8fd
SHA512c536d52650a4fdb6967e47d5bc6a963d4893fbe3270b1c232ec447e526898da43ab85ddbe60fb94507866fef29c84ca7cc2ea2c7ccbe89a028b36b38f55ca091
-
Filesize
179KB
MD551c9561257f15351c19fb45b1d5213dd
SHA1948abdd27d05c89cbd0fe83f84715e5fef5a0f01
SHA2565150061af011794154a2cb3646b165fac2096f0c5a9b91585a49528f27d19877
SHA512fd31e66c2f9a1f550eaed26ecf39ee4a8697bb157a265e6aa5894d7401001628209986a9e34ff53fdf03807bc2fe133c6f2bbe3bc995665b03f3c7b00b4d28b7
-
Filesize
642KB
MD54d34306f9400c093c2e07800bdb36dd9
SHA1114f0c58a640c4074ebc4a7cff070c21c7aca140
SHA2569ea6efb135586aff51c787a1b1301fda9b854a4f4715dfeff0b87d50a29051e7
SHA512f7e04888d3bfeb64035a0b02397105dc7404e9ea0b06c4de1baa2937ea2a9ce8ddae2e1f418e5d9bd0bbc9aaeac79aad96c8374bc7daa946bc67f1811e73e856
-
Filesize
193KB
MD569bbe6034744f1e2f323edb9480a9710
SHA10adf83a3352bd89db68e2dd0b77a7eecb5cf13e5
SHA256d8c1f3e441707f700b9f0303aff6d11ec45723fb53a5bb5674f75f89568cc58f
SHA51237f2f64caf776336dd2485d8a919738cdc3604452eae9a3c3691a0705c3f7ed8e3e6c4b7d9a0ef258181f280c15b3b792f0611acb85bcfb342523220f066c150
-
Filesize
1024KB
MD56f8b1ee4e39d9f98ac32666da55fd0cb
SHA15e7c45f1900c4bee175ad9615a95c055ae842446
SHA256de1042cb83dea6498027fe789968bf98fc33821e3e5299686f776c7a24ace965
SHA512b0a8be687cab3518e754fcbf862d5422f27e4a914e5dc5cab21f825d331e4e99a04ca253f0319482391c2066979ab1ed7ea44da2aad5c677636a2ab8c6a5ce4b
-
Filesize
195KB
MD51295c18a6985d2ac0f5243fb3b95c161
SHA17354ce48321c70cc8e39d3805afd7f3df4cb1450
SHA256959fa4533ce5b87ba4003cf0ed9cb4d9b1b8dd5379656d3dd74e70b10a2cb36f
SHA512ef36b2e5fbade16e575e14a795bc9d441fb5e88766151f14b482c5a783ffd9a77cf319e9c1d99844f7dbb40cdff4c6d10b9161ad95dbfff03fbb3deb9833f861
-
Filesize
1024KB
MD513c446da10310ac95a73a391074a8e67
SHA19d42d37bdda301666ad2ff07f44762571654eac4
SHA256cd424054798bcecd2b2a2b830451b784c766826bcb508c2269891adb75ba112b
SHA512231647d01822d69dd6875ebfe771447db7510cbebdb85cb2221b6e769548188b75eceed9630210cb912fdb974648b40c7d4c5d1f1f519a2df99585557ed079de
-
Filesize
969KB
MD5510f3599524b7fe68b269b82c0cba4a4
SHA111e823a7ab2e5b69577e55fd82a49894ed27f9ae
SHA2565ab80fba88dacdba4cea8d97f17cee0f421afc948b080cf88bfe19c4d3e40d92
SHA5126bf91a1c78c78037107ba7ee1e31ce75f2b668acda247a64fd210da5a86d1c8bd4985e379268c64ed90599f98d9e47a6bb0313201230d9c62777627647ecac26
-
Filesize
1024KB
MD50bc2c33b4d0e5e6c73e1d1d2a4f1b3a5
SHA11edf1070c71a0c6becd1ffeb2ecdde69d40920aa
SHA256b0eeda8f9e266b5c41556a381bc49798e57f5c0038672709f77a34636c49f08c
SHA512c795b9118b07d9b64ae0c4fb67f91029654cd0b3e14fd0e1006f68897703baf1c63e608f1c6e31988b6c6b3801fb153164e9156d61afc71ac6c3bcb2264b8be4
-
Filesize
867KB
MD59bfcb1950f71b2d67371bcc0e16386df
SHA136acb603795b29525a7b3f28f445242625726cf0
SHA256cf93aeccb0903aa3bbed87ff583395377f6121ef72fbb2d399966dff30d07b84
SHA512b6036a16a89d067e4a62e1e24e0c87dd71eedd615447244cace385163146ee0f101efeb8390fc12feeac82eb6d485ef1f762520e195a5f8831dfca59b8ec1775
-
Filesize
3KB
MD5ef745f6f53f438ffe11380af6fb19353
SHA1a6318f55349ce64ecc69e3aa2b2ab57cdbd7fd27
SHA25697c28d203695faa0daf5ff9732a316bb45fa9360cac344c9420eec9d5aeae19c
SHA512836f9adc2d941c3f305fa9c51de7d22d7ec871dce59be0ed3f9c7817234c7d695b24002a9b1e2058f1f25f91f5e453b3844f765bcacaa795de4c8533622b3d90
-
Filesize
4KB
MD5d3f2a7373cbbef819a840f156d98f63e
SHA1fe16a1ce9974af2e72974b05596862d5bad66da2
SHA256a18c9df4897ea03c225a76bc4a5f70b5d5ab6e32d4d85a3cbaa2e0c795192250
SHA512887e1acfb355f39148ccffa05ee9754f8e86c85611fa5d5442497bf007b8e0baa70dd41769b3a83de48dcd37e57dbcb1bd06a64259263e31ded9644065d71440
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.reddit.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD53976c14c0e9324ceafe7fd4626a5287c
SHA119385cff1526cae7c61e31af18f94bd3574ad34a
SHA2566d6fbeedaa9f167acd8f9b9711dbe2fd95f88966f3e7301254df5c46f81560b5
SHA5120ec302db02443d3a62d5e6f1055042615d2aa51482f639348a6d4b29dc11eff28b9005c3b9de8f7fdd98fcc5efd1c03c571d9fde8a64321b94a75f8ce738f4e2
-
Filesize
2KB
MD57c1a1f2708da798af61663a80dcc2427
SHA184d0b4f45c12a0f80eb180e0cf6901dbee48fa2c
SHA2561d3a01fa7d6282e266e769b78ac97c47a6b51024f90b21622f872b540dfdd96f
SHA5128cfa87297fff7311c607437d6f244dd4654396b4d0164b186c659107b291f1e2764b054475e14463c18cf48c6d12d35971b1471e4c025ba2a2063e6516c1ea8d
-
Filesize
2KB
MD555d05dc0bb56cc1086b512f75485bbe4
SHA185d405dc8c53cf611a89816782fe3f0ee8927793
SHA25698a4e420211533036fa7ba746a58fe04c8ed3c43dbc6ce6170997d2485d5f7b3
SHA5126f18b8abb42630fee8accbcd410a98aa2e8059d9006a77e2e9251fb8b545b9001b9442d5d58b77de0b49774943ccb1029e6012e4e61dd078a6bf742ffffc6ae6
-
Filesize
3KB
MD579d31145149e4fe1b1da59c59a38ed57
SHA1ab62a2d3dbedb081a02145089dd74be48d92cfc6
SHA256e1f8a08c7522945af4372d65a9954b01b991d9037d3e7d1935950ef017fba2a2
SHA512c0f52f12af9bd70228b1cc89c9af8ec79e531ce3b3c795d7a4ba4651ed24ce024b4e66d19aef25cc6c0ddb305918d8c9225cfb300309f453cdbf5d4a9109709d
-
Filesize
2KB
MD5a01d5be046c5200c79bf10eae1686750
SHA13ef93a5c88b4610820cf013b81dd3dd715190384
SHA2562c015bcb2857f491da711085a292bc03757cd130dc1ddca0853285d7ce9a279e
SHA5120ddbc5360921be2103b4870c944497917fbeedc177abb0447067892f913c7c5ea8c142eba45e3c3390e90051c8b47b2634340bc20f94e9666dbafe25a6ea0639
-
Filesize
371B
MD548a35dcb9fd36e500de7483e32c7b8a6
SHA167e47fae2cd89714f36a17f8f5372018109cbaa3
SHA256ac6d1fa7da0546146f2ea81892520250c9fd1f1d381417edc5cf8bd93c404af7
SHA512ec2dd6ed9a3c94e72afbbdf7ab2bf45126f290c6b5eafb97291bb0359df4849d067ee26362add9f7ef660b303372d58c315adb585ae1de03aa059dda6f3e6211
-
Filesize
872B
MD56f99dd8b6c8e4515f5119b4c71d6c240
SHA119243caf516938b87da3bb62dab30538359f9186
SHA2563e7dd91f69ad641b0c706390d9fb435a2cc63be70faa33b1468b13dfe47184a5
SHA5127bfcda294850242c33528d0ce73b9943205afdb43c18afe70405924f910b23fe04d3f89e8453e249c4a7cd1b84626a162e50dc92154fe85d5c0c35aad4d2c5f0
-
Filesize
371B
MD5ca16350b8d819d08562bb91897006493
SHA111a5d830645780643da36d81710ca8d2aea1a98a
SHA256bd0ef2baf6e01594127e90c1536f42e7a9e871fa300044055ccd09016103b580
SHA512c20ae052ca768fc39384545ae10c8c43be68115c6e3fae63f20d78861cb626d7921ea06f61a11d636ca69704b7b7a69740b6aea9ada2da8b3ae0e89313174794
-
Filesize
872B
MD50be1120b01d0b558f298a24b355027fb
SHA17c8236270096933cd7e2ff7c93343a0db2f9a770
SHA256bcb74a4b36d09b1d7ea53ba80cece9d60dafc4b96f99b17720b4c2ea522c974a
SHA5125d9acb819770c6365f7b2e11345712d65d494077542fa80d12e847ae4f82ccd81638b4b9c057dcfad5af11d71b2d4bfceebc23d18607a054e1e1afdc74a52268
-
Filesize
872B
MD5a8d4f25687063772afda3f5165b6e82d
SHA101e24cbb5df26ae45788f8ce33dd39b1c9c0c6ea
SHA2567eea5fe8c8c39833057c9225ef8b8a71765213a84530302b490397051e5aa693
SHA5127293ff8c963a5d80ffaf32df2db6db8ff8cd29f55ed8f605ef2cd9fba7602e65ca5e6cdc18de58eab4a216d292050e4b743a79960362c88493b61ecea9b8a3a2
-
Filesize
872B
MD5e9a337da1fd63917875de650811449fe
SHA1e8374c6829e2772d5e33962a3544a653ea8382bf
SHA2560c7f2991a004af17a8084cc19b81a7dbca505fae0fb7e64c2277372763b19989
SHA512e731d597fcf81dfce72c9441ff3b53f8dd7e908db3f949ec5e7e9d57f5c37d04642d613d2785d6dd0f1c487899f84f04a6330703b2d5d15907c6140a82cc498d
-
Filesize
872B
MD5b0ef6d9e391ef883362ef9685eb3d1c3
SHA1b0e3465817cdc4f1de61bd17c333ee312e11a6b3
SHA256dec29e5275301288b82061a7a5e555e38f3f74ea4708c4a3b171cd6a5c0a2ba8
SHA5121bccf2ad08207d5232bf809e78fd13116beda2df9d1d0829f6a8cc2d897cad31bf5c2e29730a69610d01e4d35c99ce9e82d8d37b9098c97559ac6ee6bf0a601e
-
Filesize
872B
MD53402c7cfc5c4a692a75b4addd3696ed5
SHA11baecda5425a90ca57428605c8db0943c57acd22
SHA2563c8ef6add0b7848c3d1036054719bd74f6c99c89afa50bc5f3df1397d3ab5fef
SHA5128bba41c84960a3bc43018199a1c3354c6445579aa9bcc47c2da0bdd2edbe5bfae6d040a1e5d749f7592bf70698fa06143b2ee66d422d3e1fef6570b5ac7cc2df
-
Filesize
864B
MD5cf686518f291fc603a999cf4217e8268
SHA12aa713fe7d2a1e67f24e8108b4c4b109a392bad5
SHA2566328cbb4ba1b39f899728d6fc47c535761b9ee763f2b9f50e7ddea40dbc8a8b1
SHA512ebfb402e45a49d485337b8dc63e107a3c4dbd1608bc684096894877cf43b2fa91fc70dd77a9b7d768d4f97e2731976aa0fb7e744baf7687d648ec0e3dc3a09a8
-
Filesize
868B
MD531525ba55a8550edeb76f3060f6527cd
SHA11f6eb664957e33acbc9a82fd8e74b7a2527db7b5
SHA2568151b17308e1d8a5e5c1e2200d2612e186a1f07c02a8df5ebd5668e2fe54da58
SHA512ffcf54b0cab195fa863616425023f2ad53697485771824d3c6cc83a3ef56cee3f0cbf3d78f21711e43dfe3c221aa5a013c16052c8c3413c426cce175c82d2717
-
Filesize
7KB
MD5edbaa451dff62765e3d20c56a98a6de4
SHA1ac0d855d6ae8694b57452597ce623a1a3e060b59
SHA256af3129fd91af98a133867407184e3a352f5eae5a490a703663a9a95b0234e33b
SHA512e03472171b297c747fc902e8bff5b245887de511a3afae933f3c82e5e784726944de246ce65a1da8b91c073ab6514e2bb500827ee5822b3f08fd4ee368804092
-
Filesize
6KB
MD55b112b183acbd319afb1188473173f32
SHA172097dd6795874e365b144cb331b420db10bcac1
SHA25625c0d0babac51666a6a56c439ab39160c674e7668199b65660e56f1b6531f5ea
SHA512025a636488002fd3fd573143212bcc000cb60f5be9d99d05c3c245f6f1af290b6bbe7b5ea72bc55c39ca73d7f0fd929f79aca4ec80acbab00bfcc63b40585eff
-
Filesize
6KB
MD54be6d979ec3c430e8a8dec10018ee8ee
SHA14cb4f20169306cc4f0eba6e414e5bac8e0289b43
SHA256067f39bbc9ad077758b711dfc62c6e308607dca0118268f153320584bd72a8d9
SHA5126b1804e0ce090615968cdcfcb44407f5209774f1387ebb4ba003177b46e0492afe831e2104e1ef19c4bdca641b9d3ac1782328827bf7a1eef9b3e2e256a87c12
-
Filesize
5KB
MD593d6ce23e2c502574a4c53041deb95af
SHA16f93623377720813db67cf87a748ae53ff4716f1
SHA25674e092888d8fb6ec89d7aeff4b37da21fc11b0c8b52b80a7359cdeacb66397b2
SHA512a364c40f302f4ea012e9694535abb04388b18b0bdf437722b6f16623576ac0d79034818349b00dd473a7d8d15311da63eeb721f8d763d884e5c06c6626f8eadd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b6cc3023bfb7bc99b4256d4d095c972e
SHA1cb0fe6211f0114fdbb6742f32ad7f994732904dc
SHA256f064685932d0fdf382aa1d540133b0c9e04099798b990082ada0a8dd59d83333
SHA512204bac59ee82c32410d8db5254dc6dd6dd5ecbb928e773df388e6e73354cc43237475cbab371da1e0c12d522ada11dca2c01667825ef52025528ed8d0c864c27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a781f.TMP
Filesize48B
MD575a1bcd6cd2ff155376721f0fa1991f0
SHA134dc460fa21eb634c76081e9b6634521562b8572
SHA25607e33ae6c1e0e90918c379c085a5aa4c0a8d0aa04b18d4ba0e2fb0038764824f
SHA512d84fab401d47bdca84dfdf71484cdb6b7678d2b4ddb3547659c92d7f1ce09558b9fb11d41ffff0cc7237665f156373b2d85056f43da8cd3d62b121e229512acf
-
Filesize
272KB
MD56f7fbc08b180672f6d258d4eaf3bb6dc
SHA1a31b30986b4848f078b79a807d4f95a8ad91fb1c
SHA25608fe1661998791529a50d3cb973616706070a40fdb4d9da0ee90d913f07abc03
SHA512d8d6cfba741f0395670aa9ce87f723e6b3de18d0bdd9815e724adca49052c2ee872f4d1602e133c5a2a8ed275bc51b55821fa40ca16a2ce131755f9b53fe17d2
-
Filesize
272KB
MD58926282d7c41ace031b8333ccfdae0eb
SHA17d7c39b3fa787cbbc3b001668b0f8778997ccf28
SHA256ef1140c4262857b58876548c62bacc69789ec8deddb9a71bd36e5a7b65f8c9d7
SHA512244bfb535b149ac4ffb681f3ee28ffc476986cda33550c2bc49b92609f98bdf275b017e368d0033fd52f5787ad5bed5545e4cb1ccc0b497e3232364e357b2ca3
-
Filesize
98KB
MD59ecd3f660065c25c9d0b8426b76cec08
SHA11cc55119042eccbfdd2e58fca8a53f616d534a39
SHA25633a0ece3c6f685124a304e40dfcf7b17eae25818fd707af689294d603f1cd887
SHA512dfd9ff9a34a2d6734c43a2a1f90b3363c9c2b209856d6fbbbf5f5d2ef739e668665ef9dc711b3bc39c8ae2dbd08d60de8be52bc01019061a67848da9293b33fa
-
Filesize
93KB
MD5447d08ee12f162e1120ca7bbb9dad3a4
SHA1e11c1d0d3a5876df94786c67bebfa22783de5504
SHA256405c13f6d9abeba838d38bcb6a2c7bc2b144c7dc006aad336561ae3cc19fc772
SHA51255852c4cecfafbea266a4e351016d50c4f27381431b72dffe3be3f0900115df700e3b7706cc48e149d9ea9e6b732b1c5411abe57872000793e6c3b352462efcb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd