Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Minecraft ...mo.exe
windows10-2004-x64
6Minecraft ...32.dll
windows10-2004-x64
7Minecraft ...64.dll
windows10-2004-x64
1Minecraft ...x8.dll
windows10-2004-x64
3Minecraft ...64.dll
windows10-2004-x64
1Minecraft ...aw.dll
windows10-2004-x64
3Minecraft ...64.dll
windows10-2004-x64
1Minecraft ...ut.jar
windows10-2004-x64
6Minecraft ...gl.dll
windows10-2004-x64
7Minecraft ...gl.jar
windows10-2004-x64
6Minecraft ...64.dll
windows10-2004-x64
1Minecraft ...il.jar
windows10-2004-x64
6Minecraft ...00.dat
windows10-2004-x64
3Minecraft ...00.exe
windows10-2004-x64
7Analysis
-
max time kernel
298s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 20:16
Behavioral task
behavioral1
Sample
Minecraft PC Gamer Demo/Minecraft_PCGamer_Demo.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Minecraft PC Gamer Demo/OpenAL32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Minecraft PC Gamer Demo/OpenAL64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Minecraft PC Gamer Demo/jinput-dx8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Minecraft PC Gamer Demo/jinput-dx8_64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Minecraft PC Gamer Demo/jinput-raw.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Minecraft PC Gamer Demo/jinput-raw_64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Minecraft PC Gamer Demo/jinput.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Minecraft PC Gamer Demo/lwjgl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Minecraft PC Gamer Demo/lwjgl.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Minecraft PC Gamer Demo/lwjgl64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Minecraft PC Gamer Demo/lwjgl_util.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Minecraft PC Gamer Demo/unins000.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Minecraft PC Gamer Demo/unins000.exe
Resource
win10v2004-20240802-en
General
-
Target
Minecraft PC Gamer Demo/unins000.dat
-
Size
2KB
-
MD5
e0cb8cd871ef99b3dbe837544ac47544
-
SHA1
26162b12f9cdb80bbad84dae0799c45a1c3e0118
-
SHA256
c62c9b0b4519d4e11cfbe454712061a1c58555d38af0954482c4bc4e4a47c994
-
SHA512
aa79534128d17c4af5ef355cad545249291f3da0b1a88ee9a0e7487f2379eec95ea626618dae5bf1820b37f5f7224d2cda241e4ad5bae1a3bd1b07a9eaf0d7cf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1884 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 1884 OpenWith.exe 5044 AcroRd32.exe 5044 AcroRd32.exe 5044 AcroRd32.exe 5044 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 5044 1884 OpenWith.exe 97 PID 1884 wrote to memory of 5044 1884 OpenWith.exe 97 PID 1884 wrote to memory of 5044 1884 OpenWith.exe 97 PID 5044 wrote to memory of 3204 5044 AcroRd32.exe 99 PID 5044 wrote to memory of 3204 5044 AcroRd32.exe 99 PID 5044 wrote to memory of 3204 5044 AcroRd32.exe 99 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4700 3204 RdrCEF.exe 100 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101 PID 3204 wrote to memory of 4704 3204 RdrCEF.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Minecraft PC Gamer Demo\unins000.dat"1⤵
- Modifies registry class
PID:5080
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Minecraft PC Gamer Demo\unins000.dat"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=37AD3062ADA9848BDDB332865EF7D882 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F99D5C92B0304528E8A65813F8AEDA39 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F99D5C92B0304528E8A65813F8AEDA39 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F3F31DC2D85638871B7C1A78977C5BC9 --mojo-platform-channel-handle=2360 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff2953cc40,0x7fff2953cc4c,0x7fff2953cc582⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,18009436608795499726,13159937838328261240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,18009436608795499726,13159937838328261240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2416 /prefetch:32⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,18009436608795499726,13159937838328261240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,18009436608795499726,13159937838328261240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,18009436608795499726,13159937838328261240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4012,i,18009436608795499726,13159937838328261240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3968
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\SelectRename.bat"1⤵PID:3100
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3a0 0x40c1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58a65bbacaf1629878035f2ff2debde09
SHA17511698f62db1657ca78e08cba0f030d9fff9746
SHA2560e20c49a66dccca98460272841b88e4e6c30eb7b666c023717c2927bd8352d86
SHA512f28aae2f26fd666d3d6fb57ae93fd661b0da921d7f40a452fa676072d0135d4334501a24f4e3e26b97df2a63fe089b9353c01294b1baa9650a85b3c92e53d673
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD52d6f9f0870d0333b991694f2167c9627
SHA15e5f3ee5b4219ac75799e1a5e122eda7461947a7
SHA256445590b0db678881aff01e5bcdd5485de39e8beb6e0c69a0df5b5085499ae365
SHA512c0ceaeb09a9032ba25f60dc8174b86fbd226426e4edc7da742153f2906d9c48634932fa14ed795a850a9004b3f77ee3cd24c83260d69e094592c9242832e27cd
-
Filesize
8KB
MD5325414f8605c6f67944c30a06d9bf5b0
SHA1c9c5f7cf82394dfb1e3e17b4d668a923896acdfa
SHA2569feacc86cd9c656b741de2aa248c1704a7405fdd845406363cff01bae9435cea
SHA51213c94a22b2983a5eaf6af58165b6e4360e9849e78b1a33e3addfb29c5ad35d8e3d6e3816cb1934bca477df3d786eb636e942c5a8e99229bdff829a60079c6c7f
-
Filesize
99KB
MD5593e70a9e9eee5a8be67cb74919e7735
SHA142cdd5034e8120e968146b042c7ef919bc7fb0b3
SHA2562ce9b25790a62e97c325a68c2e4da3f66be46f220c166480e9b72bc47bfbe38b
SHA5122961cb76c190809d73cf945a9fd9a6d1117163e88b93731044ac87661c9481a7d0e98f54023bdc3246ff47dcb84bec7d0884a9a0106e276c06e92397dcfbdc80
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58