Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/09/2024, 16:13
240920-tn47csvgja 620/09/2024, 14:59
240920-scw6yascqa 615/05/2024, 14:53
240515-r9nqdsef36 615/05/2024, 14:26
240515-rr2jjadf66 615/05/2024, 13:07
240515-qcwt3aag5t 614/05/2024, 14:33
240514-rw2ebsbc52 314/05/2024, 14:28
240514-rtgbdaah6w 114/05/2024, 14:17
240514-rlvh2aae7t 607/05/2024, 15:14
240507-smjzcsfa79 707/05/2024, 14:20
240507-rnf4esde64 3Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-04-11 12.37.45 PM.png
Resource
win10v2004-20240426-en
General
-
Target
Screenshot 2024-04-11 12.37.45 PM.png
-
Size
25KB
-
MD5
6b7dc856f8c243f6f19b6919f9c3a1ce
-
SHA1
8b652199f0126eee7c36304046510f4b8b544f5d
-
SHA256
b2e3b3edf52c7b02b128beba207344ac58d9045076a3c3bab471a4b1e0a7b5cc
-
SHA512
68528343cd7bccf0ec068afae317ac0201d2556f7aabf7fbf6a4e843669289c4de1115910af54d3c9cc3e806104efbf1c552ea8a2ac9195bb86eae7917a2fced
-
SSDEEP
384:Tjze0/+KycJrKUZggOdglJeysrE6tuY0ek2YB+iLIJlph:vzB/VPZ/lOuY0V93LIJlph
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 218 raw.githubusercontent.com 220 raw.githubusercontent.com 221 raw.githubusercontent.com 222 raw.githubusercontent.com 223 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602568045528855" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3571316656-3665257725-2415531812-1000\{DEE458ED-6AF7-4DE2-A3EE-2254EBB62C9F} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: 33 2788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2788 AUDIODG.EXE Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 656 3912 chrome.exe 91 PID 3912 wrote to memory of 656 3912 chrome.exe 91 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 1724 3912 chrome.exe 93 PID 3912 wrote to memory of 3120 3912 chrome.exe 94 PID 3912 wrote to memory of 3120 3912 chrome.exe 94 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95 PID 3912 wrote to memory of 4544 3912 chrome.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-04-11 12.37.45 PM.png"1⤵PID:1584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8719ab58,0x7ffa8719ab68,0x7ffa8719ab782⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:22⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3972 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4132 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4852 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4828 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4220 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3044 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3336 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4808 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5188 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5364 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4408 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1852 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4792 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵
- Modifies registry class
PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5028 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5448 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4372 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:82⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=4876 --field-trial-handle=1860,i,12132095899353505228,1968455327563152033,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2236
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x40c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5d0df793c4e281659228b2837846ace2d
SHA1ece0a5b1581f86b175ccbc7822483448ec728077
SHA2564e5ceefae11a45c397cde5c6b725c18d8c63d80d2ce851fa94df1644169eafc9
SHA512400a81d676e5c1e8e64655536b23dbae0a0dd47dc1e87e202e065903396e6a106770cec238093d748b9c71b5859edf097ffff2e088b5b79d6a449754140a52ad
-
Filesize
366KB
MD5d71f200e34d9e26af271d7a06adef667
SHA1f4bdc7dd9597c4e6455b3d72a2cca3e0735edb9c
SHA2563a3ad691ae95434d69a2dae6098d050251a6f40e12e888eb81594bd6405ab755
SHA51211689276b82e629e78779047a4800cae01e8e986aeefd9066593603350fecdeb532f934e7641910044d497bb9a77259f822cb67f1d25aae14b8e9143e3db1900
-
Filesize
46KB
MD5f0d81b309d4441d6dc22bdcb9e9e7d01
SHA177e7510fd01735991f8eb242a8a20acf5c7326d6
SHA25690b890766ed0dfc173b119f625e4bde7785d509a76d27354148bf0a80a09889c
SHA51279d3758017eb11ff478e0c258405aeb66eeef77b6041689708667948c85c1ff27688491eb8fd7efba3e5d392e299c055b3ae54fd212a0f5caaca3d91c425829e
-
Filesize
19KB
MD580b654ce97922793f0ba65eef9460504
SHA14d9c8ee0f4046505655513161e006e9b1564f178
SHA2561fffece56e8c86c14a99d17897e0fd2173d673b954dd3727e2f26de542ac3289
SHA512a7417350d58d0984b266d850216b50c6c8a22bf77249112a9e1fc15e9d0c5e8f0b72aa9659c59a9620aed4568fbfbf9ec0db7d7f7ea8aa29d59880520c684dd0
-
Filesize
19KB
MD597f199034162b1283dbbbfb994def15a
SHA1539f1d9814baa54fd3425ec0139f3cfa932301ab
SHA2563cc79470f85abf02f16c22e1ab349ea126a5d6d1a2da8d302155e0dbc26f0d7e
SHA512ba709e9f101f44349e356d0d2c126a7eb07b6400d4c2ed5710caa4dbeb5fb33788b162f3b96d6ec2e1957d14229ff17af3be8606740998bc4ab82f153bfadf2b
-
Filesize
1KB
MD5c599134647afe89e03ac6377a6846398
SHA166d90df2e96413f37f749fbe335d29fbd054485a
SHA256859a7972ec94f6b8b696917c6085ac869d1892a97741aeb0c573c20f0d4917bf
SHA512b9ecb78657b2fa4d5cb72b6ce1a0d814453430feb077b30d524c3b824ebda762afdd15826d8959c37da39cbfac2d4fa622b03b014f359926e2a8cd41210661ce
-
Filesize
4KB
MD5e993fac876bafca966e329a100b26e4b
SHA14576404e7dfbdc41733ce8d1147e2e33a7e88dbc
SHA25677a28cb4c27dcc53c1aed5918091260e9d5ce67fc22fa34510c15d861c0cd6e5
SHA512be1c39e28ef7fec05169d3ed54547ad4e1d0ac722e8bc545be597f4a7ab35f2537f332cfb4fefb80cb3a35725adb7a1abe8167efb01b66684ece7e51efe3502c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD57ea304455280108fa449a295604110a7
SHA186bdfe24afb5b346dd3e7c7b42c27f10c8d3f316
SHA2563a65ea75536f0f53574781458e054db846acb54c0284808b5df1bb20853b3609
SHA51279e77258cfe28740e2434eb4867c646d5ff822d76a10238fd799f6d33c8bc498512323556ba1f6884e6c5e1f67f235bf575508a10c05fbfae7228cf7d76ab036
-
Filesize
688B
MD5ef032c258a5e94fba02b5e185789d449
SHA118279bfeeaf59c5901b4a0e426f7aa884709e2cb
SHA256960e6d61f5e8987bfa8dd9bd5f3db71c572fef8ca2dda095e4f9868843bada35
SHA5121a2ec678c362604e5613602cdd41b9a10eec9013247ef6d7bea62efac1169d9811264ad0468e67c59902a2f17e4636d054c6ed96a90dd1218b141ec14de03a80
-
Filesize
1KB
MD54c0a36b5376df37b59c8c07ae430e193
SHA1cf73f0fa5c52a7233cfbb47f7a5ca300278e094d
SHA2561b4799523407f8301100c0d3754656836bc5c67ca46619b6d3f745dfe3e6b00c
SHA51243cb01fcf2fbf281e9ebc57e05fd592970d20e7dbd9389f4f377cac56a22e8cd9c235eb1770064a91d25e1b4e0ba64343926bf23de04b181857c8a988bdf113b
-
Filesize
1KB
MD5bff1fe2cb4f69b0af3bde6798492ff2d
SHA1fbe156687547f32c8c2d2f89dd8637065d8e438f
SHA256b51c3c78716264f5a84d84e20921fa8b38f63de71ac680a38517402da8cc6ec2
SHA5126d844fc1f5c690e93114978463976dec139c6f11fe8c7ee8754fa9ab8d2f8c1c67b51d44e001718eeecfd6b687e3333b523313ce847a19ad6673b4e44d3a9b32
-
Filesize
2KB
MD537944fedbc083038b00980ca318271a5
SHA1622ee92feaa92173fc087b5f40e35e8737100b3a
SHA256169e7f9c16ee61dcee32efe810cdc8f9ab539bfeaaea4147ddddd90755f4bf4c
SHA512ea3d122ec748f85addb90dfa7380436575be2e88145ac72abcb09229e77e25416180f05f10dab18570ba88c502dea0ce1cae49a8254ffca679220c100b4d71ab
-
Filesize
2KB
MD5ff9a6589b0f74dee556f8486b632901a
SHA19ad466350740f3f4c041b87d142dc92a1c78e3f0
SHA25644bdd6bd4fe3af2b6ae6a1853808272a03d403dd210e29307a74bcbed9013e29
SHA51268ae64033a865cfa0d89096078db180f3fce284b9eec848664ce2b76255c17ea9ac861ef62c7dc9acc33ca52e16639dc0e43dd5c298a66c6e8924ee1c79c6b9c
-
Filesize
1KB
MD5719bc52830759b142967e8a970152f8d
SHA126c026d438b823ed51cdaecfc705d105d358bfa2
SHA256f672d0b7d4e0f7ceb106d0ae7e87d0ecf9edef865928cf3838ff7e9b8bc0077c
SHA51239ebe356034a49e9e96e8b4255db18415e3056e1620ae7aac53b498e7e6330a6f162d5112cf1c08448324e31e852a77c52936e04bf90d33cabd4db7de9fc9942
-
Filesize
1KB
MD5128b26fcba2ab2438db3f9de805b2dc3
SHA104a70d405a9f9c9c0ea45f7e676b505b0b8a590a
SHA256f0e6e5244275168ae3ad9f4cd6b117fcd71c69d731c8c174463a0f54aa48fcb0
SHA512cb3ce80e8dcfcaf741981caff21d783139275dbd7874bb7e32bcca6dbc244be06ee6ad370ca9f5de81bfa2bf83f5d8c29de15210414e0292f24510c46079b9fa
-
Filesize
8KB
MD54fb70945542498a17d76e32b570624ed
SHA1d8a6acda6c51f0bba3143da512d1c7344773d454
SHA2565f999df72bbeb650a586d2ce1463c27f9bf5284b2ac24d550566463e854fe9cd
SHA5120da32b4e8e98039e356248b2e914e6769de5448db2e9f5c61c982b52cb19eabcec77d2762f03433d00d16b053f2025f82364507c120af26e8762fe4bed7f244a
-
Filesize
7KB
MD532203155788cda7a8ea5f3939b1c953a
SHA10a03edd111db87175bd9d5c04a203975c22a3e4a
SHA25642e0d50efb2bbffdf8176077b4f92bc92afab659915add2f046f4b7eeb8bf5c3
SHA5129d85e075cb76fa43c32743aa3ff20aa966868139d6a8abff67f4b8d7cd1f3642fc81b9191ea8ce337c3ffd9584e6acaf78c86f66e74023d8d1d61a8111bf399d
-
Filesize
9KB
MD5d231af0f4108b9995dce9c4292c95964
SHA107b2e7cc3d63d7d6defa408597c35b486a404087
SHA25660827c05df38db10e0c21855ac4496b34bf73bd4193efe7d67d44ba840e0a2c0
SHA512b5e90670e10b97ba32efdf2c8f0a442bc58845c187a6477a72ec38b679de83416fa9c0707d408779c0561afcb1e2672076f5b5178039bff75b983427504741ea
-
Filesize
9KB
MD58bfa51c18ed4ac6eaec669e1872ac890
SHA154badc7be572aa4679007edb5c3c0fcfb40d0c5f
SHA2563c302ab13afb5e8e506afcfc563e61ebdea2d38e1b2dcc03c0671513dab97100
SHA512539f9985bb301fec0597eebf577855274c63e976094d1f6ebe41db2e3ae0aa0a1026b622c8931f48d709ef51a0df0ccbc6b42a6ac2360ed12327ac424dcfe6ed
-
Filesize
7KB
MD5088ee2a6d158b2a288dd7f1c87d0ba1c
SHA16c96d1cf52ef3b099fafa0e61c215c9ab2838969
SHA2565e0e7d34c15fdf5abfe800c87aa3ec3c2b9cd3b61f71f29caf73e033e6635def
SHA5123027d6ce3e66eb6d9cd10248c16d57c3dc1c626f83f60603e330f1ee7af0cb1b25ac63fa76de18cad3015bbd6642cd7cea5cfa5d523849af5439bf8cb1907934
-
Filesize
7KB
MD5e47dfd5a8e54559b4453c37cdcc2e752
SHA1602706f56f08e30ca51933bba3f8d634a71a5d07
SHA25673b6f364e07a37c3cb2e9ca1cbc7cc13c81d9c175b77c081492535b428cebe7e
SHA5127ed37d4bb8b5cfc7b7123437f6569f748a4f76e125e5568fd7574dc27f2edc6d2e48598c260350fd951af9d1d1f029a2210e57b1197882c96bc9372071084cb8
-
Filesize
16KB
MD5222093fc381ea4a52d88733910a77db2
SHA1fafc5e532dec96f57de621be4c5cdca5e7d8e68e
SHA256b0f674c8ff4bf6501f1a8c10ff62c0384f4b0356b6a473dd6e162890e2a89ce5
SHA51226a42b747e1291fbdacd36d14e5bb35fea52cc4d33c15aee9244811de05f536ceb666180f88ea5a2dce0fb7344dc93ed1850548d696118cda10e8d60ede824cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b83df0e93fd18ff75bc71615a01bcd30dabd5704\index.txt
Filesize74B
MD52d7e22c6746c7e42b6bf79fb9f8bb3b2
SHA120859f83717b0c983327ec5c75ed179705ee4e70
SHA256f24c7de2bdc1d6a242d2613efc1e203428ad33eaa2c11ae77c8ffd810d6e524b
SHA5120c10b599c3189a82e0d2079abb7ca8929e92aeb38f734aaf4399c47e38899db9f879f9385fa358317226cde48fb731d79c089a744db697382bfb01a18e0474c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b83df0e93fd18ff75bc71615a01bcd30dabd5704\index.txt
Filesize138B
MD5541ee610f7f52a5ddd887f4d1888a487
SHA14eb460d19d9fc49c82ae2d9e9392848aeaecab63
SHA256b83d11c908c7bfd4323e82b8157c0826dc9ca226c8112e0f988e8212dea54871
SHA512e89bba19d51e8840223750ee55b04c18203acf315a265139de0a975653befb77716ed91467c2e1c5908cd6fb11a8336d5ada68578f535db812552497fbf53b85
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b83df0e93fd18ff75bc71615a01bcd30dabd5704\index.txt
Filesize138B
MD5077c04e32975492639d6bbc95a2390ef
SHA1832fabf5c5673f1c100346831041f2fe7fd975c8
SHA25674e351f5dc1493c41d94f94d8c25dd9e16a317a8521f03ef2d8ab183289223ff
SHA51225cd1faa3233b0e39a81a6d4a47739cf0702bcdd0df4d941613f353c12aac77ff0b3212909abc47a14b24d877617f2373dc9a03c756d89e8331e3255d506b38e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b83df0e93fd18ff75bc71615a01bcd30dabd5704\index.txt~RFe58aac2.TMP
Filesize138B
MD57c128ac1e2a09482078e24f33ab34b0f
SHA13a51d3c8e009d079a1e07d5be6d4fea7e4323573
SHA2563d2a172e492f0381d0c36bef1e12d292726cd7e8307ddfce423603be31070cd6
SHA5128498398f4cd058850f44c9bc3fe04eab446e1a60bfde1ea10fb24b65490b3d14afcc9bc181b1edabb4a41fb81ba02b18048112542e897bce6de643ac64f4bf05
-
Filesize
257KB
MD55b1add01ab760b384249e9b425894496
SHA128089cc7c41c89eacbd528a64cd321ab8769aac0
SHA2562ac216d42dec77fd70f54a333493757e7280526af69d9161339e32ac018ab800
SHA512c3037fe20f035aad61eef9a558c0263c561c4edb0dc75e1ed1f851ab62ddc2d681dc77ab01d0cc7be70bdfb285a9db1690cc076dc281415e253d80b261119eb7
-
Filesize
257KB
MD5e6025045e3fba5328dadd91ae7f3c1ea
SHA10a2398faf9b6e5ba62e8d0fbb3852560b3553fde
SHA2563adece71049f4f28ec70d6c0def2757e6f6d055471e2db1d5c99fabb3339f950
SHA51271e12e1f2adc59e202f212da88031fa3adf3cac8167d8cc7deefbc6d67a329ff64519cc094da058457a1e47b6cb8bebea6e1125bdfde433c3b3add4ef06b8f74
-
Filesize
257KB
MD557dcbd3cf8560931fc6b8bb7b8ddd4b3
SHA1e5e39b74db983d3587500f5c022c5fa41b5d99f8
SHA25644534474e95e8373fc57ef72201cb96a24814880df51f4c28d0f93cd89d8c6a9
SHA51239d3873bc76f7c9508ca7396a78e0fed3d33a7a9d8743e3f9cb561a85e98469416b02678d9b86ae9c0c3f43eeb308c52bdf7b86ca67de6e671858128d75cecbf
-
Filesize
257KB
MD5500aae3ccc58e30c7471861863a73c97
SHA104a6c75ad8e478f40e298a6bca2bb364a7127285
SHA2568c1211a18c5a5523aabe5bac9a272eadc2beb55f6d1e667a3dc5f272e5ca75c5
SHA5129d9513734c8e14acb1880d9151ff39cee732ad223c0002c502c61ffa450373fe4f1065b8aad9d334c1a2948c7b7d5d945ba51c9c1cae3f7cfc4ddb8062b7c678
-
Filesize
257KB
MD5d1eeac80c425416021094ca5e1ad68ba
SHA13221ec4d79fb495a43dd7b60900e719f1e187a17
SHA2560eb30c455431b5f25e8c53e6b2d7004f44c3893d6678175cacb91141e2dc7a30
SHA5120857bb0b612603e38deadfdb0c2d5308da8b820a560a45cfec6d13f790e3c2570163fba7f82bb649b362ca58179650f656a7bd81624bcf4976e36d6f95a0d676
-
Filesize
89KB
MD59354afbcb253193c562545cf2dc45497
SHA1840d55c8a210e8aad61a43290c8b41a292a80a4d
SHA2560ce2070b7978656ac7ccbefb82cacab73b92d48e60ff9505966e47e89c745682
SHA5125c9895d9629cbaf41a5cc7aec5994bff650c7dddf3424a1d5683a130eafc66d43955ad6bf2c2c8f7f72b2417dbc5e6a2469d096d08c307931c5b3c8a84329078
-
Filesize
96KB
MD54d658616ffe6b937921ff651b2dd4b67
SHA1f1ffab2df3b274b572e0788816f1e31bb07af836
SHA2565cbfc0ab802d37d7422f261305b83eff602c1f1de940a97cbc8e322e5587ec5a
SHA5121a3372c6a30bc470b14a3d9814dd8a172791e630029f756d03da7a8e2fc25e7cbf6d2d8dbc8133bfc4e5a292aaf1ba52088377b50ec57c858db99af966ae4977
-
Filesize
102KB
MD51c807b5d5c0979ce018947aef50a0b0b
SHA14bd07d3a16739e6e0d2e8e583c7502492f5ab5bb
SHA25697c36edb2c2d78f609182dd357465df6607230e21a7ab37451c41f2166a710e6
SHA512594537a604b4d70c449384ed37e04b68f10dbad1617231a92edeb6123acf4c4ed9aad855d339d8cf090757e1e2345eec6db33c0c35f4926fc31e7c1f3acd6ada
-
Filesize
88KB
MD5e0a86296d7a0d4542cd23404cdbbfb85
SHA1d09562fed6ecf8cf361605dad4c8c0b31e6422a1
SHA256fd84cef8fedcd8d4d96b62543e146afadc549cb947058b79133723698e715ad0
SHA5126efd389883751365c067dc0605fcb9da7896fd9da5d72c39798c0e92d3eb7e6dfec528dba727f9124fae4398b2df415bc0480f3bd77b7980892ff5d310999e49
-
Filesize
257KB
MD5eb1f8ce1664ef16580a8c18ef0cca28b
SHA10070796bb22ba38b757cc05a03b013cb446b95f7
SHA256cf63096c4e6039e153d0bd34c5c247346f68c9336dcf7d72dc1be784a483ad07
SHA5125d934801b476ea55c9f8d9aebf5a2babf521cdafe1d0247b569e9cd537d758dcd07e0c3ac52feaa09c67ece74e12f56b8a326b9bb4964cfc94801b3e9c1f34b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize8KB
MD5ffc50f3010496c895f2c64b1a73e6dd0
SHA1f38f59abacf107504cb5eb94b826f4e0c1a22572
SHA2561f9aa6196e587af7b9d2ed1d3e984df51f117899bf2a8300668834a6e6b3e3a2
SHA5126af8098108ede3c84eeb200751e586237661868bafe538bfcfc67a12d59e3d0936ba04a3674501477bf61b2897ee9ac3e202d16da3902a26c52ec270ccfd992f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD520dd81c8a27da8cc0a0b0aabd264e46e
SHA12dde0715ce46fa7921ca4955460e6480a6a8563c
SHA25656448e046a55b5eb59abe6a9d6f3d8924792a6870dfcdaddc8eedb6668bb1b9c
SHA512461a8b921363734cc871b963648bf59d85cdf362f8b72f6de82c9f14a8a7c3f8e284ffce15f6be7621aee954ea6814fff07262df670faba55081636ad5773361