Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/05/2024, 12:58
240507-p7s6zsbc57 330/04/2024, 13:18
240430-qka8bsfh6z 530/04/2024, 12:58
240430-p7tgrahb62 530/04/2024, 12:55
240430-p56djaha97 329/04/2024, 12:08
240429-pbbxtsae3t 3Analysis
-
max time kernel
329s -
max time network
327s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-04-29 14.08.01.png
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Screenshot 2024-04-29 14.08.01.png
Resource
win10v2004-20240419-en
General
-
Target
Screenshot 2024-04-29 14.08.01.png
-
Size
193KB
-
MD5
c878a00682bede49df94e06e07db447f
-
SHA1
3d2c0e0abdd723598b036abf7b884a2e5f643b56
-
SHA256
4756b0df0279c72945b8458636ef48a10a120ca0c5aa888acf380bf5df5a3f13
-
SHA512
b04a31e781e8e50332f01c9f648ecd3e5448488a37dfc51a69c6c34f970d00cae375bb0217cca3d0d356dcece0c84c909680275ee3cdcb7880e5d0da3cfab196
-
SSDEEP
6144:2fn+ThcZbvN2X0M/nbj2lEL2ZSzCwjGUZ0/l8:2P+GZjMzbj2G3eLXG
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589556051676683" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2818691465-3043947619-2475182763-1000\{DF420F3A-17A2-498C-AF62-BA00974F4A21} chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4336 4040 chrome.exe 103 PID 4040 wrote to memory of 4336 4040 chrome.exe 103 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 4944 4040 chrome.exe 104 PID 4040 wrote to memory of 1012 4040 chrome.exe 105 PID 4040 wrote to memory of 1012 4040 chrome.exe 105 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106 PID 4040 wrote to memory of 3712 4040 chrome.exe 106
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-04-29 14.08.01.png"1⤵PID:4624
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff8e879cc40,0x7ff8e879cc4c,0x7ff8e879cc582⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2216 /prefetch:32⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2460 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3372,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3792,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4752,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4876,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4448,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5196,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5360,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4520,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3580,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5412,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5428,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Modifies registry class
PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5784,i,5575645792879427653,6231422987548174021,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0909db8c-7950-4e5c-b884-95f72c255227.tmp
Filesize10KB
MD56463e97b912bc81811d3e63d19add5f5
SHA12c099bca53dfbfbab3896293e6d35d35e3b3941c
SHA256a65ea1dc78e6d4a097d1c1bc1cd7df80945d95b4b124ef16c83f8128c000f342
SHA512805e9b3dcb13c8c2e1aa500830d818000351bd7e44ca2b8a27fc4e73643867b4c4c729ddf5be82fb38ab80b780d2e93b3f999b82abf360d93f75524088ae6130
-
Filesize
649B
MD510c0ab26ae89bc7d3150694760f2e80d
SHA1141da198e3b9426f730e8f7ab06bd45c2980a26a
SHA25615526dd65ba20023aa74131885f74bf50ce46fea7e4069a710819311c46c1c29
SHA512eb78493e86b6dd5e0f11c216824f7e00cd4dafa7317f81f92af6e0113e2e750e89b3a471311353e191b1b43d1be809036ecf00ce120cebc9dc206243e1a951d6
-
Filesize
3KB
MD5c20c407c709a889628b88a47bcd06e87
SHA1e50af4e51870a2685d652018885491947dee1bf1
SHA25618f529f6c20355f44987c88e2d59e08d54d87f45981396d6d5d5e0b8568ecc47
SHA512e3b9aff2b1a29f9830694c679d2e606f22d2335f4e8f9bf9886c38188c05f89f498efc4df43063b39f152c354fd8ca0c8cf6e2023cf4a6844259553a3e76d0dc
-
Filesize
2KB
MD5298ebfd72b99ceb1c1305d2c88b59ed0
SHA1a4dcf666d2e2af1512f33e51618f1264e78a7a2c
SHA256810208507f8f3b13a309bc4004d861e7f5dccb084f1e6381693f26737737a3bf
SHA5125744801eb5307e224adbcbd46907f0a341fbdbcf1cb19a722a6052e20b3f399f67155a546b939e6d5a60626d75ce5544e20e91f36de1fa2824a2aa66791b03e3
-
Filesize
120B
MD5f8a47dbeb23a95dec039e0dc8cc8d584
SHA171e1130523e39b2250cc0dfd3952f061f4f714df
SHA256780622c4242b8f9587fd7ec5e9dd0805232501e41cf11e4dcd4f481bc84f96d5
SHA512304987453fffa4a1a1e918ce0f65ca28464e3ecf6bf60899535b91ee8abb94fe1da7440f5b5be6dd47054e572f46df3679af12bfc4ee783166662b5c95485e99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
4KB
MD5dfec2761a445eda7d0c2e246d14848dd
SHA1960b1edb3ff127199b5ea415f85fd12e3d65564d
SHA25695f80fd89be6b539208781ab2bd3d5fa75641689477bb6e38481a426c3cca681
SHA51277792fbfa310a40a7657deb06ec14187bfa1cca657d0858db55f34d2fa6e0d26d630698d3c0ce0c32fad69df67a2ebb986f3b0f8efee8cd52dafc292d79f6870
-
Filesize
6KB
MD57d3d119a328cb00b2ea98db1667b1cb7
SHA1a97989ff65d5c006d08b7213ad3ff0f3f4aeea82
SHA2562d37d64a57390e7637e4d1cd43c631ebca66b67f82b58add1262685f1bd1cb58
SHA5125a45b46b2c39da0d75a6d5b28ca615fcc5da835eb22c5874207f6077559f6423c3e21438689b9b58150f9950da63077cd5e0eed238eccce000da87e7994c1c82
-
Filesize
5KB
MD5ed69363d56378885d155a7fc1cd40490
SHA11d6a92ebb23627c1ddb01668443982e19d03022a
SHA25692625246c818abe6907c0b9e34bb2ba9d0cdf7ba80e3c0b54c6c7968c40a6394
SHA512fd71c60d4b6c091f99d12b3ba588b68be6cd2cbee97f9fd4918f5973410781cf8f58de53b0b1b9f4640a889ab99bebe1a8be03878a84517e9760dfd3dfaf71ec
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5a982f8b7255adb88bd40c62f2790eaca
SHA1b148a8504dc6089300847c916305260ec391c9ed
SHA256e56eb0db1098f892b7248c3ca8925c2cc66d14449fe29f06b4c286403ab0ca16
SHA512753b1590c4c8d1549c5cb76b460074510b1591937dc0db6397603d3cd81cf5a1cfb5fb2daa774fbd01cc7cb814a2cd783d8b2599210311c8a97c8557793f650f
-
Filesize
356B
MD554d246ec3bf36545f17ce5cc6e4edcad
SHA1fc9c229bc0d92323b77fd6089d04e5aa003474c5
SHA2567db8ef6e2620e2bbfadaedfc402b16a5c83385b50328271d4054a01b91c9f372
SHA512b4c34be10eb18bac017cd34ece8031bbc8faf04bc4b827bf0a2590ecf31daa6def7d0797cade28b6f5e0a953345c26701199189c4be48dba4ebd063d1d7a7a47
-
Filesize
1KB
MD5fc1edd91817d964629782c9878b02aa8
SHA1c3a7fc8a6243082f382a3a177b10c91748f556e3
SHA256af89595659ce98970bbdb6a3903f4d684badab529550e7d61d20d765c7bd398c
SHA51225886a6e149b8fc668e07e0b5199195f1a18f18675c175205dffc1062c280c7717227d75c996c5d707852fc2a0e17546b19252c46d659fe08b5ec697656f9943
-
Filesize
1KB
MD57430c9479b09ce4ab39d9595c477d53c
SHA1a022785e7296d971769339952a6a39824206676f
SHA256c95a0fea3e2b471daa3d978479d24b067ce1457f94686d667614c84329afa25f
SHA51287d1d7cac56b946fed5e01ee17ccaab9dfa98c68eca54233cd3f71a4bb0f76e332bdb27e206e8f1839a3f4bdcff76c069aa315feb706736bbd6b76d56a16b868
-
Filesize
1KB
MD57a2e4608c7f112af82f6c7a32482a0cc
SHA12be3ab5ac65051c56d6c010f5ee45f5fca81937e
SHA256b08efb6bc53dbcb872a2a483ec3f259d1ca2dcf2b1b19bb4aea2b6da8190d52c
SHA5123f30a5e7e2e3ae5d7cbf683cc1a25ad35d0c2cad99ffc93582830d6e78a4afad74ad4de4fa05da8e6892e90fceff3dd90fb06e0355ca55d5524e4f194a9ca05f
-
Filesize
2KB
MD549e7c096dd0027af6523b14544292892
SHA165baa0e2ef8d29fa90bfc50fcd7330ba4e683a3b
SHA256a9b05aa2345303b22cd69c55ca1bb63c2f3dafc72f2d42ad62f7645e99d61484
SHA512475d0cd36ba1eb5d8bd0f77d36d75bf6dc647c8a2ffa4c53d2685116033c12d586c0ea82cf4615488ab08142c4138eb26d97e1ea01cf17c4437e3f97f682c270
-
Filesize
2KB
MD50e5a84684337e7bbbe5eb1b8fae10760
SHA17955e20d5ba35a1d08456a7e0ecb4b3c23bde8b9
SHA256d9099af6eee99d13f729935157828905fbf54c58660d12d1c39373ac35b0e33a
SHA51224fbc97f0928e49a6a96a0c6efc1f605970b2cd1c84893fe44075bce686945a6813b6fcac3d363ece970ac61ce7dc5aa0397ea6f08a3beda4be0c8336cae46fa
-
Filesize
2KB
MD5fa8b45a9fae2372335404e5d73335241
SHA1826fa5367c095801fd90ab56bf7c387c464cc8de
SHA2564353bd2c3342caf245a957a5d4462ac672938cfbe3e42e2915f5424680b10ae7
SHA51215fb1e33d877f3b796525d8f2e031620deb45a58945f43ab2e3327e8440fc17f607b5e1a56378036754c6dbf65318501268712f8c20351434fb991ee825b1997
-
Filesize
1KB
MD5a1d82d29827b463653161cb429a12ae9
SHA1c95934cddc8ff52f8ea8af33bb0425696705b3db
SHA2567f4f6693351f7f00cfea17f05805f6765f8d94506af6127d8c2938e8d435beb1
SHA51281b627dc971ffed1e6f4a13773076945083b39e40348f15764e0d8d3f866639c11d373eec11190041b5f6648d56446556afa4d0cbd5c34486f554606f52fef07
-
Filesize
2KB
MD5f0516d6fa24f978f624aa50338b10590
SHA141988f57c517a03d7bec70853fea1b8487bb3354
SHA2566f96616d25b63541bfc34c57576baff6dca009c7525342acade5af24973032a0
SHA51233ada13de2a543efb1a99da7fa91a6e5fb1aea09b5ebe16e4b7f87fcf2683563857276ef9b0d5c5fffa9832c72d3559ae6a2b4968b0ecebb04fd1ab425e59e38
-
Filesize
1KB
MD5b265aef433d9e7e52178f515496724ea
SHA14d3980603e7a925f76c30bcddfa3a33993a371e1
SHA2564ac89822797f7e97ebec9135093e6baa76a0118f5786af2ce2acee46a686b892
SHA512215e4316a677478f951a853d287f8dd069fc9345e7dd0b732c65a6623f7f442417cfd651b0230abab68a28bfe0fd3123db95c608799064c2f89b1f7251956df2
-
Filesize
2KB
MD58d7b29413abd2e518bdb1edf3714962e
SHA10adb86e5e4f9d4926a6c6b068004bca058155ce0
SHA256a12f7ec50572c306b13d3f05f7f260035c2cbfca57df9a5f69e538f475af8180
SHA512c18cab719af39e0f7d0323e32a6d3b64b21da09f4dc935361cd3a9ae615d619274c6b81c6827803b1c1f4f2ad835f6a978869347406a8e619232e621ca2f023c
-
Filesize
2KB
MD51896772fe22b6653e96f2273b85c1541
SHA17c67febd5f120001df04490680a6030ce3034a0a
SHA256a8c6e0075c7a2653f89a58cc39a7a54063e4fb1e281d5ce64594000addefcae4
SHA5127b65f507de13d3318eff298d3ed8bc4b5661084d925be8cd665d3053dd5c885b5ed92a7cd9e787f0ddc73031de4c1d93adcad9ed30820b124035c2806dcca6a4
-
Filesize
2KB
MD5996266b3fc6825bff0cc55c45d12ece2
SHA1aca443d1416ef2888e11b681f4c42bca6df1b16d
SHA2565e74aa2ed1565eeaea73f97965972f2c7eb65e11c567f530cb11a7f95d4ed870
SHA5126d15aeb4bc2e3dd4199655c84d8b43b0fcd2a4b8259987a7753abe69821b4b6d35f48f80ba2f63cdaa095b2056766256f59de4b67ea08233793f40fe69c61bd8
-
Filesize
2KB
MD56dc6413f27a74cad1b1aef75b0fc7004
SHA1213666b34f3886324cfbf548373514cb120d0408
SHA2564956d7831803a307fbfa7bf9153e3515761a48b71e52f5351371071322bd5f89
SHA5123b13f83a232b9c3c0af2298fbde433ee9eac43cb9512efdf0d78db1a349f1c6a91f24da1a0b772d98f922ef93d64f1555d2f904cba5cfc71746486895570603a
-
Filesize
1KB
MD5552f372d3cf883828b82a63417fa869a
SHA1ec4797d6e5122acaf04c7e8f062343eb591b6292
SHA2566fcbc2f698e8a030707c021c3a358f03cfdf8870d2f45284c14c833d2fae70eb
SHA5122717d301d92bce505bd72874043309e40b66521b94240d8a520d994120c613d2c8ef0eefd40fd1ec6bedcfc4405738adb640bfb5103b9b59225637c68ec62a79
-
Filesize
1KB
MD5291591a767a452e092b71da7b562433d
SHA1c0359ed08df2a605cb2f50aef30f6ee67a4c38f2
SHA2564e559fc3bd5790efdd08a9a02fb0a39b95ef1a07767346edd8d54a5a5004f02d
SHA512b3951897476ca14b0025ccb39a03a24aead0f9ca7a16bbbb58cf2f00d04772ee82a5d9b5cef80c1ee09c9753c18fdfa0b5876c8181ceecd868c78b710426dea3
-
Filesize
2KB
MD5acb68d987899349e29d16ca9c6f41d4e
SHA16d366ad3e44b44cd437931cfc8fb25d9118827b6
SHA256defb5612757150e992c2815a11e2ee8711ac49c946dd73998ff1e02fa641e37e
SHA512b367e0c3e352bbeac2e847c9261d6e63c4d1d08b30b9f30386450ef029dff02f111086e49ea99fee22924a16ef10c66915b47e25b34662692bc5b4dae99564cc
-
Filesize
8KB
MD55c9b6d82704d2d36fce228ab1e4b47e5
SHA14abde6f8b44c7a47dbb85649e6f5f2c4c9c5fba9
SHA256da95bb38c72e9606634a383ae5a0d5f75770249f75b2075f3f0cce82fbd98435
SHA512054412dffa035e83a48f7812c0cc70b6db0a6b29712b6846b130675aa5d5dbad950f560083af6efa1e369bf6cd9a211230743927b90763ff00b5e9b5dbeefee3
-
Filesize
9KB
MD536b989b1f6e47f94751fb63412d5e3d3
SHA1d52d75ea83cb1e3f76c17ab5f5d30caff1e3c8db
SHA2560450bdda3072dd9f8c4ebf7650bff91a2460e95b2b2f4b63fca5296d45dab0ac
SHA512e00114be6b59080bfb8fbeb9970bf30b70676cd9933a54254596a3c796bddc20128232d871cfda30b2a6636af059b7ac351b3c345b6d64de15caf6acbbb0952b
-
Filesize
10KB
MD533fc8bbc39cbe69e26e8b29fb9ee22d9
SHA1bd208874a2531699e442eaf7e9f9e0d9ac0999cc
SHA25694e85b0d4525a8224f859f3f0b443845e428ac665140d6cb42b0043e729a18a6
SHA5123514527460cf844cc1783892e99f3cca08af2bc17cff5fbca020df0ae543ba977c7c8f7eaa0f3ee086f40ba94324c2f47aed5b80b3b5bbe4808dca357e08fb17
-
Filesize
10KB
MD581e13c2992edbfa9860554cff75245c8
SHA101e46654f1b01efa4b7ec5d2358add51a5aab000
SHA256f48b29705fd81596490a00496a68e262242ce6bd450a9655356a39780a2d98a7
SHA5127651a36f30933d0d6f738ccfafb91aa06f87edcd240d215a407a348ce68f1723c8d175c276470f07c457cdf9bb4e05f999389d546bbe2f9c4eb0d9049d15377c
-
Filesize
10KB
MD5e8f4a1ad500e44db695113f54a59138d
SHA16ef5db60cadd9ed158ac88e230689dca7658718d
SHA256500a64f9c1da9eee4156af54e79cf8f7a64a3c2dcbe5204e8d7d03045b631743
SHA512e576dcf8a9d2a9b8301beb2afa61ea3601d4406af0d0c986ca578122a4a0bb4fdc5ca9adad44f7d5e58fb2b66376859ed463e82408dad6206452a3567977f1c3
-
Filesize
10KB
MD518d977f64d6734d4ad30d0ceb653a66a
SHA1f4fe45ecb754c7e4e80bfeac502e3e1aa0393cdd
SHA256fde887c190b11498052b2180bcc2429d3ac4c438480c209e8861f387f54f6667
SHA512ed45e095a16622038aad63cf0c56baaf87bb294ec5f02fd4921055551d44c77aa540b9faaa2a8f4beebabf9e009cf7f548e36c187ff150ce5c0861eb179e4ea5
-
Filesize
10KB
MD508b372fc0c26f612799cdbcc711e5285
SHA1a4de7512937356e60b892d5f879c2e3c25af262c
SHA256881109e547930eead8867bf5219bb856f6b2b4667520034d3812a665d249c887
SHA5128efeb30c81561dd198a1b61121e5b8cc28701cbdca260cb3df59c5fc009ca58be3cae6b625613bcfb9cd5f13ee4dbabc113ab3a91f104d806a9493589dd0ec9f
-
Filesize
10KB
MD5d4308fc44fb82946e103e6290d1da8a1
SHA157b338d567ac2496386e0f4293957598e3cc15c8
SHA2567d996cef49442f3735b7c2dec793b3d72cc96c1d57535a65f02dcb79dd53146c
SHA5129086a909c223cd65da8cd926702b78f65698d71d4837e8242af4644cd0c58a087efe0cba2b04c1d152fdb713340814b408a50758a52f86b649245d80e70bbe89
-
Filesize
10KB
MD51d539dd954f375699a8aa5c6a52fa6d7
SHA1aca1f161a5a97401246984ff0b9f880682660872
SHA256e46a4b5193d7f4758ac28c551f3b5feb860f4eab49877ca12502fb08374d52de
SHA512dd0997a3ce03c471fbb0d699e89aa3da8f69cb58572980c145fc8515a0c9692a67160b2e937e244ef385d7b3e27639a7d949821b964a35e55ecc967bb25a1d29
-
Filesize
10KB
MD5aabf0ce42bfe6e912f65d2952df54a40
SHA115658aaf9e19476645f31d8fe7d928a1d55aa3e6
SHA25650f90b6f5ae10c5cbea51f2833b8f014e4bf32b5de2d434583d6ba9e965c1bb8
SHA512926721a4752087db2bb4a07b7517d5993d01b2fad088a9c6331a54866dcbd7aa92d88db58cedc1d11587f1ca64d045bdd06942581214b97a196e986df2d4df29
-
Filesize
9KB
MD55bfdb89612580aff51eae299e6fd4bd8
SHA1f913e2a8168ad1b8b67c71916a4a9cb273f19a03
SHA2569798251eab1455fa26cbbb250ffdd59b9df0e46078a1748771164d4c90ef0f32
SHA512a543463bb2746b836d9d497dc6e27fac20dc234e76ef5d562a3b9d72233d6ad4e59e8af089493a4ee09d189e7b5192a70d239a5297ba16da2d2b432994952a1d
-
Filesize
10KB
MD58d19475a45e40378c8ebc3a7788d4aae
SHA1b379f5316a41fae4cf8c79e14a5cdbb22b7e179d
SHA256282be8db255bcf19d04bb2b2f738350c2d55255e8abc092b1f5c0cce58e50146
SHA512de5b2f969705a6fb54e9b34a021a4173a3c2db8217d3d7331c6cf39586d139ff9d4887ce111451f10dc99eb786c41ee39184453367eca95415f0e6dd676aa46a
-
Filesize
10KB
MD58505f6157091f7c4ba1b3d497bac7235
SHA1eafb9205b282996280d60a33275cf012805d3e3d
SHA256ab88a69e7a755fc876d2b48853a7ed84a06cedabf94098f0d515ebbaf5c8918f
SHA5122ba1f3edf687bc13813dbf1631f04d2d82202ab038cac62cc2d7c7906baec6767ef1cfbd2abb93d63880df41423f29ba4822b43698a562c123861f34297b21a5
-
Filesize
10KB
MD50e5b4db2439a5dacc6ad3d8296cc5019
SHA1636d14f8577358dd2befdab81c7ed5d622b6f1e2
SHA25672e8ab9c902d548db8b0d685b6fdc54a51bbc0f926bcbae73b0db137e667e3de
SHA5125cd9bbf89f9e7a4563cfef5face66a85f14c8e85678a5a61ce63c07a5cf72510b8da30629177a395316dd3d123d445aff797270bd6eef6b378f96683b93dba77
-
Filesize
10KB
MD59cd7bf4c36389930522ccfb9dc8dc763
SHA109cdcbaccd38551357a2a0cdfabd12fb645bf6eb
SHA256f469498342209bd9f7b0608424abbafeec992bffbd2f6effd394e738e0dcd3f5
SHA512d86e3e2e650b48f66033bf5194615fc9e53e3dd04722d3529be7f43c49a763525cea65c1538b8c0ff9f995b94ef1f750f499a88d9104d98e92eb221586396ed7
-
Filesize
9KB
MD594c4c31fb1eaef25df1cd7b43da1961c
SHA1076e07cdfe5dca3db1b2e96c082372d3b7bd8bc6
SHA256ff20c322328385a864944f624e93eb5b52f330e543e17b8b9fba1dd25845f449
SHA5122994af07202554af57da3aca8682d02e5446b2e31e00267edf1889401d328f8e2afd3fea8605cb0d7b3c0c0c08146a9f816dacd7dc49ab81d8e332a0f90556bf
-
Filesize
10KB
MD5b594a47c238335bcb395cd5876f91f40
SHA1c722f61bb0f0e4960b084b90df14a3400a4963bf
SHA256baaa09080f8f7ac392bd1ec8e110e81c85aa374871030c572187590eb2979ae7
SHA512fb8e273aa2df0d7008a77e88ebb5b13c9876374fce8303f749d7c22460e19b41140d0b96fea0b34caf9ba9a789115db1daed323b7e25bf19d8b1539ebf68eaf7
-
Filesize
15KB
MD5a180235a315517786562c87ba2a18b2d
SHA1e21fa56aebfb2b586f1120302929f9593a61c6f8
SHA2565037a378f14048206a56447ef3cb6d98f2f8041c8099c7cfe703d65647ec904f
SHA5126e3e0cc95db57c5192d02677bd744ddd5f47c70c2a020767b4fcd88b779055dfa894a4189e9095d4c5d227f82737c3347dab2dbf31a52ccd6c59be828c6f2e10
-
Filesize
152KB
MD55d6cb80ec45b86482123e5b20fe668e0
SHA147df515b2855cf3ec8afbb71e82a127f6a1c696e
SHA25675d54526493e461c3ba328da1e1f09a69b8ebad08a4d50b5ffe1a2ac8984904f
SHA512f8a5ab8aa14238ec7f3bd6fc93f7296acb7e181a33b51d75c26efeca20b1892c5f898ff8c1b4fc6e1421a2627dc87de6b61e236cec57223e69e0805d5c12b3b9
-
Filesize
152KB
MD5416233b7effc4a0adb4223724fb2aa47
SHA1a39d917554e286258d0e142f11ee01434d1f2c50
SHA256040cb51cd2541a39433f08b32a155ab5ac86ff7740482a3a086b37dbf9349c5a
SHA512126dfc86760ec3abe9e5f232acc2180c1ceae853e9f2dab929cef43c237a299ca8bdeb9f2cde94c014f01722364ff86fe6e5bb46fe96248beed3458740f46341
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84