Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
The Craziest Curb Stomp Of All Time 💀.mp4
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
The Craziest Curb Stomp Of All Time 💀.mp4
Resource
win10v2004-20240508-en
General
-
Target
The Craziest Curb Stomp Of All Time 💀.mp4
-
Size
260KB
-
MD5
aaef8fa1e6f56acaf86fdc180caa340a
-
SHA1
f08f394c96a04b8ca1a2b637bce66862c64becb4
-
SHA256
15d3660bf0168e772f38b9b113c63be4e7ee7c7a337ffe7b694e61f8a520c871
-
SHA512
69cef7956d4152a04b7cafde7cb60dd547bd10277192eda9a742c8bbcb973f39b317dc0d88ceb19dd6c199b792e2e47271074ac673685452e68baba8ff1ce8ab
-
SSDEEP
6144:d2LVrToY1j2hH2x/0fFSf2SUMePS+drI47Xr2pK:dmpsC2hW1KGUrXrhXr2pK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2752 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 vlc.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: 33 2752 vlc.exe Token: SeIncBasePriorityPrivilege 2752 vlc.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 2752 vlc.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1336 1400 chrome.exe 31 PID 1400 wrote to memory of 1336 1400 chrome.exe 31 PID 1400 wrote to memory of 1336 1400 chrome.exe 31 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 636 1400 chrome.exe 33 PID 1400 wrote to memory of 1916 1400 chrome.exe 34 PID 1400 wrote to memory of 1916 1400 chrome.exe 34 PID 1400 wrote to memory of 1916 1400 chrome.exe 34 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35 PID 1400 wrote to memory of 1092 1400 chrome.exe 35
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\The Craziest Curb Stomp Of All Time 💀.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c29758,0x7fef6c29768,0x7fef6c297782⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:22⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:22⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3240 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3708 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4048 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3856 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2556 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4004 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2424 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1648 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3952 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3488 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3612 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4248 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=4452 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3844 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=4136 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4252 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4744 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4752 --field-trial-handle=1380,i,1375700309710247218,4364045524686841501,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5489251049ff22d475f3202164b095c6a
SHA13f4cce6a55edbae2a50ad4ca4357113807dc0120
SHA256dd17e550376bcc75a21b5979cb8960c6a4ff5e9896f7a5b20f0572ceb4d1356a
SHA512ece55a2b3d3a3cfbadd8c6fe5d277c09bbfbf2cd8122d8b61aba7267d06ba3e4dfb74bfd6f41ed7ab11dcd029110213fab2cf8295e702e3a60168b4e2a770158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ef1d393876d856670bad6cb18641410
SHA1d16b53176655c167719fb395703591c8e220773d
SHA2565a428b4153a8e1f9f3bd3469bec5ff9ee7bc0fc79d037866a22717912cf2a6fb
SHA512fcf8147e1b9f3da38198fa0106a697e37b20dbedfdf75c5fc5764dcaba123a0c359d6b017d9464ccbcb0c9453875f75dfde255ca628617fd3d59b57aa4cd6b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c446e51edf25a63399a82b1ab12f701
SHA150f5a84e3c0f2db4a6a37d0b72bb426582dc5398
SHA256822397ed0d87e28452b0f8dc059eb9d269e39210ba9c343283d03872eeba32f3
SHA51291ce044cb148fe3e982bb9c51e8caeeef9fc3388bf525f50bbd503f9e87a8270a2a6bc574185d3c5661e18b990428ab6761cc93627a58be410c66000ac24813f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc4b6b83b721c955a67c326c577aa50
SHA118de13055340439e43517dc0710df636136d4118
SHA2566a5189311d599584ecad229cf40fcc26b4699be09c1f8bb5e8c0d38ef193ed10
SHA512b8677426a180c522842acab1132b3af5127cb70857faccb8110dd5841683ee83b1d76bc59500c7797473ec1d3b0895e871384b0318d964ed6a953dd8622be4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f8e9e065c211a48f894ffa9780a0be3
SHA198b27ae47f72d64e99aa263f4be32b6e7b9d9379
SHA256b66f44c0f0f53a3fda3277952ec759cfa4af1b4b15b8481ed9157929929398c8
SHA5127b5ca432cd2338d6592851b9ceae52f9d3b9ba98f1e77ef49bb406201054ca03455e7f2c88079709557608862118a12209c897175120524f67a51f96179bbb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5106bede3ff6b7bf1445473f9c851a303
SHA1e0c8e2044b3cd51d9ac889a2368fae5499f88ddd
SHA25654b75a0b91ba812338d6c92a746ee88cfd03a080fa4e28ad637129b9daa4efe8
SHA512eef70d6333f326ad78b504f1a7e84e82b5f23c8aa5ba0443ab32d3c4bb85be7747b30aa875dd6ef48835804b897f44699f8d44def5f54ebe4fe6ff3f5254ec2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd1337c3bbdd026c279f113684665168
SHA1e648d9e00341f4269faf0def9f6ece9a42a23aba
SHA256d590debf7092a1d2db1a594acea1eae0474f45eda7450bcdc52146a63f95f07f
SHA51283f23e2697b0afe5b250c5b0492e79172e5f0324d725b1b83384c66d01a2d2d341328db8782ce1eced5d5f314c8b0ae3fd6b864f63febba60f22926099ecb3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7dc8d9dec9c76a63a6dbc6de1bffc0
SHA1b22c9e38b98cc66564e089183c9d9dd544a26ae7
SHA2567475dada8d0b8510ddfc1a6921a8eb03447af960786cafe0345796f018f875da
SHA51207d3b87a25052c087cec9bd2d7c1418a95f9dc8eee5047a3efb32efd279ca32f6b3b18da638f1666a9f1b465707ec2d87f66bcd7903f94d393961bd62e4d1c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc2c2e974ae21657ad57bff845fee430
SHA10316802a2c38a3fe901b16df87a599c910bb99e9
SHA256296f45d29ae8753d9367914aa1738e51f526aabc19e12574fc3580348db8775d
SHA512973245d30f67732639f89c5a5b124f02fd4a1c185c50c2651a47da63ebd02924beb26fc6e3b53621ec2417e9a157d3cd85cf1a4efb8ac07dd756bed12409081f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e489e71c29ffde0eabf2cdb878e3cb81
SHA1309feba46981e8333745a0b00e4954c6207f19f7
SHA2568184ec941acb66020654406494fb8a5f62a3cd35bbc886af08436d188a6970aa
SHA512381a1995ed48de45412aba1c2b618422a6dca4185f06863607cb03ba5664696babc5eb6d977d410fd09d84fb90a8cfd28979a06bf3a72b017800dbaa141c80f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5b6bfb0f04b8a87cff030046097d8fb57
SHA1c5bc74980e5910eeab8c1019f108d225095bc8f9
SHA25681104acccabbea5343a3c3195b588999aaa1497d9f0e4b105dea8be305fe62fa
SHA512b2ce6a3b041d3f54b93a9500fddae2f51f9c7b6aa15f557d68d91e6938cc8740958bcbcd2acbc4974951d180e5e21ca161af89005cb7d71b3dc4e92a8fefbfcc
-
Filesize
40KB
MD55ce7bdeeea547dc5e395554f1de0b179
SHA13dba53fa4da7c828a468d17abc09b265b664078a
SHA256675cd5fdfe3c14504b7af2d1012c921ab0b5af2ab93bf4dfbfe6505cae8b79a9
SHA5120bf3e39c11cfefbd4de7ec60f2adaacfba14eac0a4bf8e4d2bc80c4cf1e9d173035c068d8488436c4cf9840ae5c7cfccbefddf9d184e60cab78d1043dc3b9c4e
-
Filesize
19KB
MD52b845c3bbfbcb4e28ffbd1838368decd
SHA14414c101a651bbc06ab2d1eced6932338278e7fb
SHA256addd85cdf92ff6c8fe37ab271bbaf49b204ebb8f0e0782ff412959c1e9ac57e4
SHA512c6a374402b6b038387d385b81040d0d6ae83b2a503be91335b4b641e9eaecace2696871b7ac79af7e78e526212de77f128738cd47142c8ff1494a11bc3a4548d
-
Filesize
504B
MD5095ac41766e72bfad335a6e89a7e15ae
SHA119671ef4a8878ee0803d40c580466b85e214697a
SHA2567d5483951fd89e874e4800c4c7de00e7c429b22fca210ce299c6f7342e7aa8ff
SHA5129301d31a05273edb793692d55f486a614b3ed915d26c408ee6007b82c40bf4fe23e39d506fb0a85b1a90a4a9eb1a60654d985a6718412b1c6b08fa961f7b0e43
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_infinite-craft-nealfun.fandom.com_0.indexeddb.leveldb\CURRENT~RFf781a25.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
854B
MD514c6039f6c10daf758fa013972dfeb27
SHA100841ffa208ec15d3cf23790de3110f5aa1dc196
SHA256bafa7818db17e6c5bcdac4772dda69de4188783046e0f15de7558037e37c2380
SHA512f1464274017dda5ce28360925d9d10dca73220dbbba7fb111674f97dbd75080a9f433fb60177107ac528103b6a7f1965b3968f73c0ccdd69f55da3a5433b34d3
-
Filesize
527B
MD56eee3a5bd7579c6dde1f2e2d77c74db9
SHA1af8cf6de32c3fc2ff4babf344ffd2a5bb627e451
SHA25679c857b111e2a3ba9946f5d55ef46aaa600aae7561598d65b850874bbee3b9b1
SHA512385708b734f779c58ddd8da1efd20d4f263eeba3e1bddf0f49ed1c7806c7076be9708136ae5528becdf1029e0e95161183235f4fc96d68bcac03bc5c3e5b5ae9
-
Filesize
527B
MD5a7f98fe61dc5182801950dca6dd22d79
SHA14dad4b0565c158d07db968176faf8d009b19fcd4
SHA256dd995b3983bf8492678bf979b07d2471bd724d7b873a6050f81bcf6c9f4a5faf
SHA512010fea49fe020569e83861f17d8838083d38c0bf7466e71c1dafe8e76e1cc2b8d0ed89ee85f9f10b94abac9040e98074906b159f7dc4ef828f6a4e125db1482a
-
Filesize
1KB
MD5d524f4b265abba0034692fe0eff4250c
SHA1b53d95b420b2163141bc9c32f3874441d163a314
SHA256adc4e689ba47b3e841b0b5a7241e8d58ddb5f528250ca63ee3ac828b71614202
SHA5121c6455e21cf897af3e68644a9f4e9c6ed98562178dae875b3f833363a440de8079edc1038afbbad87513402453dbbb5cc3abc4e5ebdad311d5d1e5e506bb19a7
-
Filesize
1017B
MD5cfa252f01968f046022392fdceca9db8
SHA13fba31346655d6073586c83f296ed8bd9d07ff5f
SHA256cac8bf3f8306edfdc62190420ce505546279c23538a91349716d46a03ad7bbd9
SHA512ad03ea3eb6e92f78b717de709203ac2ded13f5a9f3953af74017448eddbfe4b79fa0d0e357cc382f597a0f92f4b3e6a298bdfd460ff179074f264125dd8c0690
-
Filesize
691B
MD5f94e78ade081c677bfe3b31ba7004a95
SHA10bdf87e9ef6b480b0182d10293c1f3dc868ba9c5
SHA25620fc7b032b1bd00126df5521ff5fa6368c9e90d1270f9105d21e50c6c917a8ac
SHA51204b7f3e9a2bb8d38d599516530e47dc74969711870d7d5897db255a86cd55354cda0d01da367f64e47ddcfebf0bcff9ee4bb23e96d3b9b48d760513088d7efa7
-
Filesize
854B
MD50a5e6b66e533335c77e27096cdacc54d
SHA153035884c91fd7afd054cc218905fdfb2ab80bd7
SHA2561fba0fe7f947b9da06457bde3e45942462c7266521fb7717f1bad29d87e8bf1d
SHA5122fcb21f465945cf1dc6f9fdd010ff3cd00ecbdd6ab63407f89138c95f69fd4585cb20a3d404dda21946b9d9a1226d0fcb03a3f4c10df7cc37503723f98e59b24
-
Filesize
4KB
MD5f1f6b66b4679af9a065926226c8b5671
SHA19f5565bc6081ac13f79626b7f6180041b4202735
SHA25699bd757ada9ca4efccea0d7a83989922c394cd34ec9cc005692cecfb7431c6af
SHA512dccddd3a1702f6674fa2003b4e7fb0f1b66a3850c2f47bc0d6d20838ea629291eb213291a4f56bf4a9f0c4bc28222f67cd2f2302805fea3affaa9cee18dee2d5
-
Filesize
5KB
MD5096c9245b5715e3605808c3dcac6e004
SHA11fbaac1d721a3c689497a9a131a14756e6ea4af2
SHA25676c70ed404e98ee790370ef2c4f525ffb6f80303fa25d957b348f35db0136cae
SHA51275c5976435386ec287fae28f500324173e677382077cafbe67e663c89b8b0798b6f6ac733e31cbf0946046bf369e6b510b0b17bebc96fc0bbd1ec968b7a55ee1
-
Filesize
6KB
MD510d3ce7dc0c1fef12e6a1b53c8710797
SHA16d6a83c1e331fa6647dbe9520b3ae2dca06770da
SHA25645a371ed6b0934dbb69d04e3f5dd767feb7eee6414a020655a79eb21e6fb814c
SHA512b5e3c979c65aabfc0dd37810004f767b8bcce8629dee67390e03dff1668db608e1d6df8574b0f1cd02734df3669e7e98436f2cedc9926f2a6867ce8198879264
-
Filesize
6KB
MD5823149ba3db12731eb4556f471c52614
SHA10fc25221f81a52e7fe18a338b45095158e0c7e29
SHA2563102d4181883907eaa104727baf4f9acc07d7de1c4471efe32f671e54715f126
SHA51235366be90bed8823b57ca57d2b12c9f6edab824d1f9e9f005b9291a0a66b1b13a0f2fb848aa5eaf9db81c32ddc342ccfd28f5e7428b284a302d36139a6fc98c2
-
Filesize
6KB
MD54952975d53e3504ab30db6e94cd39f46
SHA14f76da43713c0404035cbba95bc570a75b16a8e6
SHA256159f461d09ec5c1f367224e643795b8e7694b5476e78af72fc06cba4095f5968
SHA5121c56999fef37711d3c6ea2bb75ee63dd7973bdf53264ff83071183e724f216babcc0cb2cde1cabd95609d5b2995cc4ffc78678967bbd4cf58f49e961b53b98e8
-
Filesize
5KB
MD54200cbfeffc53d705591b78e1cd3022c
SHA12758f2bbc839ed4407592813791618adc0bca58d
SHA25605a111408dc09df9b221c9394e0577d240b572fd45c81b557bd4bfd15b9e256c
SHA512bf2bbc656218ecbbeea7291db3b71672e31ba2dd3e2d533f6ce68fa05af8679a30ebbceb6bbf13a9372a70977463ecff02534f24d50f346102a943a41b7c207e
-
Filesize
5KB
MD52385fce8c4722a64b02bc93478c39091
SHA194930fabbdd43f25abceffbba76e77490bbb49c2
SHA256951a4514c2324461aa926fda27713a1b4f7634fc3ab0a9ca54672dc9ce276064
SHA51209d068a9035c6790a8aa7cac8931b408081cef9bdec2ed3e9f10e558375acba2e68b2e606cb4dfc7cd9a2cfff96a55576e94b995e2d27e881437d48467d6d717
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
270KB
MD57dafa1d392e38d661a021334721c5b61
SHA1cdf35ccb9e6dd5b4583abe643ba3f0f3dcfa9cd4
SHA256efb7d781684caa4880984d64d8399487929e3f1bf03c3e90d1e7264342a27ee8
SHA5127e5206b276e8835b8e0ea908786834d620aac949720e663e1ae888d92337439a20f1f8e871dd7cdc7b958cc3de953d4a079ec57f9c5785d320af26b16d782e30
-
Filesize
75KB
MD51190dd967ddd9b22101e2ea7bed56d9b
SHA1c359b7569058713302af37f8955af4c9ef45d55b
SHA2568137ae537cf37f2217c3823625046ad9983c5cc0e2bf04cb9a8aec33cf44275d
SHA512d75a4a360178eef9b6028e544455787af5e98ffb3aaf61367d4f1248a3cba2bbf16fb5f6678ca88a1395fe503dc639c0130d13861f782bfb83c0cdfd51e9ae95
-
Filesize
76KB
MD56a46227f39e56944244114e1b5653ab5
SHA198fa1b66bad2449f3fb8f2cbdbbe296655724867
SHA256d41e9e4d25e72d8289f334a4cf1d684f9572c180a3a5e28362b92de941f83441
SHA5125bdf56c22268a1b20ed834dbc58719db1942bf7deaff9c2947ac3ade932cdabeb9f9354e92884707ad526bdcd13360d053ee45165b438d3c107d56ddca8670be
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a