Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
6CyberDEV C...nd.pyc
windows10-1703-x64
3CyberDEV C...er.pyc
windows10-1703-x64
3CyberDEV C...or.pyc
windows10-1703-x64
3CyberDEV C...nts.js
windows10-1703-x64
3CyberDEV C...ute.js
windows10-1703-x64
3CyberDEV C...yed.js
windows10-1703-x64
3CyberDEV C...le.pyc
windows10-1703-x64
3CyberDEV C...on.pyc
windows10-1703-x64
3CyberDEV C...ey.pyc
windows10-1703-x64
3CyberDEV C...ot.pyc
windows10-1703-x64
3CyberDEV C...to.pyc
windows10-1703-x64
3CyberDEV C...ls.pyc
windows10-1703-x64
3CyberDEV C...ver.js
windows10-1703-x64
3CyberDEV C...nt.pyc
windows10-1703-x64
3CyberDEV C...on.pyc
windows10-1703-x64
3CyberDEV C...__.pyc
windows10-1703-x64
3CyberDEV C...ns.pyc
windows10-1703-x64
3CyberDEV C...ns.pyc
windows10-1703-x64
3CyberDEV C...on.pyc
windows10-1703-x64
3CyberDEV C...ce.pyc
windows10-1703-x64
3CyberDEV C...er.pyc
windows10-1703-x64
3CyberDEV C...__.pyc
windows10-1703-x64
3CyberDEV C...er.pyc
windows10-1703-x64
3CyberDEV C...or.pyc
windows10-1703-x64
3CyberDEV C...er.pyc
windows10-1703-x64
3CyberDEV C...ts.pyc
windows10-1703-x64
3CyberDEV C...ns.pyc
windows10-1703-x64
3CyberDEV C...or.pyc
windows10-1703-x64
3CyberDEV C...ct.pyc
windows10-1703-x64
3CyberDEV C...ui.pyc
windows10-1703-x64
3CyberDEV C...tp.ps1
windows10-1703-x64
3CyberDEV C...it.vbs
windows10-1703-x64
1Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/08/2024, 05:40
Behavioral task
behavioral1
Sample
CyberDEV Client/lib/selenium/webdriver/remote/command.pyc
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
CyberDEV Client/lib/selenium/webdriver/remote/errorhandler.pyc
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
CyberDEV Client/lib/selenium/webdriver/remote/file_detector.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
CyberDEV Client/lib/selenium/webdriver/remote/findElements.js
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
CyberDEV Client/lib/selenium/webdriver/remote/getAttribute.js
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
CyberDEV Client/lib/selenium/webdriver/remote/isDisplayed.js
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
CyberDEV Client/lib/selenium/webdriver/remote/mobile.pyc
Resource
win10-20240611-en
Behavioral task
behavioral8
Sample
CyberDEV Client/lib/selenium/webdriver/remote/remote_connection.pyc
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
CyberDEV Client/lib/selenium/webdriver/remote/script_key.pyc
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
CyberDEV Client/lib/selenium/webdriver/remote/shadowroot.pyc
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
CyberDEV Client/lib/selenium/webdriver/remote/switch_to.pyc
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
CyberDEV Client/lib/selenium/webdriver/remote/utils.pyc
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
CyberDEV Client/lib/selenium/webdriver/remote/webdriver.js
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
CyberDEV Client/lib/selenium/webdriver/remote/webelement.pyc
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
CyberDEV Client/lib/selenium/webdriver/remote/websocket_connection.pyc
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
CyberDEV Client/lib/selenium/webdriver/safari/__init__.pyc
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
CyberDEV Client/lib/selenium/webdriver/safari/options.pyc
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
CyberDEV Client/lib/selenium/webdriver/safari/permissions.pyc
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
CyberDEV Client/lib/selenium/webdriver/safari/remote_connection.pyc
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
CyberDEV Client/lib/selenium/webdriver/safari/service.pyc
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
CyberDEV Client/lib/selenium/webdriver/safari/webdriver.pyc
Resource
win10-20240611-en
Behavioral task
behavioral22
Sample
CyberDEV Client/lib/selenium/webdriver/support/__init__.pyc
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
CyberDEV Client/lib/selenium/webdriver/support/abstract_event_listener.pyc
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
CyberDEV Client/lib/selenium/webdriver/support/color.pyc
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
CyberDEV Client/lib/selenium/webdriver/support/event_firing_webdriver.pyc
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
CyberDEV Client/lib/selenium/webdriver/support/events.pyc
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
CyberDEV Client/lib/selenium/webdriver/support/expected_conditions.pyc
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
CyberDEV Client/lib/selenium/webdriver/support/relative_locator.pyc
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
CyberDEV Client/lib/selenium/webdriver/support/select.pyc
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
CyberDEV Client/lib/selenium/webdriver/support/ui.pyc
Resource
win10-20240611-en
Behavioral task
behavioral31
Sample
CyberDEV Client/share/tcl8.6/http1.0/http.ps1
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
CyberDEV Client/share/tcl8.6/init.vbs
Resource
win10-20240404-en
General
-
Target
CyberDEV Client/lib/selenium/webdriver/remote/shadowroot.pyc
-
Size
3KB
-
MD5
9a6e43648c698d8e00ea626b2487ce97
-
SHA1
c292ce9d88fe4e3df2ba14c926b290c1c3ca9918
-
SHA256
b26741176f75f8eaf2cb0c542b1f4fc8d91feacc94b6ec82148de60108ccb529
-
SHA512
ef32fc445f3c7c883456f5467ccc683041284d73e9c3a61ea9db9a3358fe58001a0505f309500d23981f0e5a2e87ca3021cf8ee53135443c65bd162ab4006ee3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680877709905391" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: 33 5056 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5056 AUDIODG.EXE Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 208 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 2460 5024 chrome.exe 77 PID 5024 wrote to memory of 2460 5024 chrome.exe 77 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3020 5024 chrome.exe 79 PID 5024 wrote to memory of 3616 5024 chrome.exe 80 PID 5024 wrote to memory of 3616 5024 chrome.exe 80 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81 PID 5024 wrote to memory of 3884 5024 chrome.exe 81
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\shadowroot.pyc"1⤵
- Modifies registry class
PID:4632
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff872e19758,0x7ff872e19768,0x7ff872e197782⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:22⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1868 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4952 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5128 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3208 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3116 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5352 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2916 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2188 --field-trial-handle=1792,i,16132636935247669447,91876195258766976,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3676
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3981⤵
- Suspicious use of AdjustPrivilegeToken
PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4ccad344-ebf4-44d9-bd31-c004ac704dc4.tmp
Filesize5KB
MD5243c8fff2a7249a0fba90b3f3c0528ff
SHA111e49ef7f451c5f25b26e36d08e021df70305bcd
SHA256617a18fd5e54d338a9c010385c46e92361bf0ceb0622ead68a0c213873a898a0
SHA512014eb0eb5952c7ee18c3775a90381e13329a5dd82f13a7140a25e1640dcd40cd790f584877c993305744c59bcf1422e0a0f4c47230880cfa060fbc7776491909
-
Filesize
230KB
MD564c53baa2ad7f46d7a0fb6f9227f145a
SHA10814f5e6afb8fedb623aafdff8fc2a0e216538d8
SHA2564a415bb2fab84ba6424295a545d863d00a72a5036d06a02259584d15d1970e61
SHA512270cd9e3cf4b52f914ba24f5b4fe8843811a484deac2ffb74fac5929242cba95c69d32e5d1f4c6b988f9c42f00c61eb1073bfb8fad921a643a37eea72bcfa925
-
Filesize
22KB
MD5778ca3ed38e51e5d4967cd21efbdd007
SHA106e62821512a5b73931e237e35501f7722f0dbf4
SHA256b7e1bfadb8d9c061f17a7234df012df7842ab1aa8fb6f9579fa3f0a3b4a75bc0
SHA5125f6f02099ca8079305fb7e7f43ae4344d522271fe30379c0854d6a81b7d8adf408a50a4b799b5f52e6ed162ba6ce7fe97e24a2b9719df780e75683d3aa103d09
-
Filesize
1.5MB
MD57151b7e30b5f6224894e135cbbbc8aff
SHA1171dd26ec6cb000d326175808db0f472f60cf87d
SHA2566e23241d756a5bd476d28ebe0934fdc4d05842d1f60434a6f1af5c8e273dd35e
SHA51228d90a598206b60606460d1b6a2f4c7ebb9e3533a6478c70dbcbabc3c43206d232fe05cc7878d7bcde4ee4eaee87768a1d4148f5a3e2b3e943cdc9ac80cb81d8
-
Filesize
20KB
MD5cc8df59ab6c44146a36c78effc385e9c
SHA1efd02ff9bec92bb269c153c7d604b0e32e73a311
SHA2566063e1962f1cf2415e1e0715eeb331ae0248e5f6f896a9867643c133d700a5e1
SHA51243c054e59411f8f563bebb2d24e3fd55ae83fd7811f39c16193374ac47344a3c38a6ad26ddc01954ef5079eec4bc6a75d636fc2a9a17d45bbe7013010155969f
-
Filesize
92KB
MD5d37365d0ccc21aa70729bde6fd60a626
SHA154b4924024236ac2606fdf4eb47c89894ce8fe8f
SHA256f0b08f78de16611994062a8b111db86fa5fe881a2cc7444f213678b109e11bed
SHA512a46840bf6fdcda861d75bf7381e2afeff0ab17fff9c8fc39dea4179e71d244fad6f3fb029a4d19d6289f213b8078f6b47e7bece0f236f0725d7a7c7bd7d37ebf
-
Filesize
696B
MD5a176288cab8a7fb21b5e30d811103b00
SHA1633c507c447d24c204e1fa40208558739e8a6b13
SHA256fc4f6828fe7dfb197e4f740ead529c078bccf00731937695222916ce378b30b3
SHA5127b1e4d6e3d366c8598246387ff06402c167524ba7d097bb78a538c8cac56a0d90aa6668fe1236be97f839d3eaa7f695ff49308e27e967941f0430d33add016c7
-
Filesize
3KB
MD5510a70813b6fd97728bd3440d9e38c93
SHA17ef87eca9197eefb5ca5089493acb01fc3571041
SHA25640f82a336ea24503e2210703d1d6a1204a62e728ec9d9c454084d243d03bc0c8
SHA512a31dfe8c2e6f2eec050201cf830bab3336816c1f9d4608a9088c11c257df2585a4b42fafe425a38404b921c1794af7a6258bd5ebe7d8c7f1484e6e9e6ace4fef
-
Filesize
371B
MD56bb59178705137c60d300e2210d58cad
SHA1c59d7e82cb99f0208b561ca7c7fe279a592d2fc4
SHA2563edcb1157e582a399665a1a69b81d79a6d38ee5370ffaee7140f525aaeb72a43
SHA51251575313a3c4ce8d655d7000eecc1de9cd6e8eaa3ee6c245649783240fe5d8b95413bf8518868ba44d4e57dadd6198159a7aea1da50b04102be9578e0958e5a4
-
Filesize
874B
MD5564177a220ee200e3ec502745249c2e0
SHA1a535f1b60e48b67db2337066c35c729c9b563b0d
SHA256b34fb7bd997e816a2e992f568cc0a1011b89e85ddd51f329cb981869e5b3b82e
SHA512c4355131702211074b580821c9be865fec675af7c861c26266bdd771307a018071e82f75ecf5e21aec6276ced7d32cfa5938e7cdb826b323e05fe000ea7649c4
-
Filesize
7KB
MD5ebbdea41217bdb7b1a639f0c788c6878
SHA10578702038cdb8bea792a2b8092a4f8ce4457965
SHA2564196bc61fb9d39336d80a82fd82efb0d2ec2a55943cc9e6752f2de698730c019
SHA512adf6d3957fd74645a3f065300783893ff7cbca9f656f8f1fc4ff3841278ae6cecbc4f877b790f3da40893afe2ad51f165ad8120e34d4a64986c6bc3dec408b8c
-
Filesize
6KB
MD5718456a0c08c2622b1c97c43fb8c3293
SHA1a35564454b3b3aba7b0700532741008560c605f3
SHA256464962c6e0637c83cc882b1904db473c3d5325ae189275336b1053ef8e9988b7
SHA51250c75bb58ead58160c0314b497b5acb433047e8d3d8d1c695190cf8926947b27d54473459f48bbbcb3df572f93df00671b4f79eafb1580338ebf39b2ce4e010c
-
Filesize
6KB
MD53b9e48ed64a9c53fa787efca83d5cf87
SHA173ce99485f4e7a4c7f255e60607dd3ab38b62300
SHA25605431ed42565f56007a0d3cf3ebb1b942b519bde41d945b32a24c53f553c9303
SHA512ca19652d2d2f7b9b6c5ce63ca9b4d445aca7ee643e26f311f882b100b4fe339a111776b27dda5f4f289e6c6c912d9380d4663953329043969c6859443ab5a2b1
-
Filesize
12KB
MD52f01842a5616893760f55be443024ddb
SHA19cbf84cee5f6083bad5c2b8904edd3b68f947287
SHA256372013be62454603ee1fa57474543feab5f6f2a03c6b3416d2b20fba558540f8
SHA512e697170f997fcf142d45bff9d72a919d2c95e4c56bbb0f140d1f0b4d2249e9b80054232f04d0c8229444341fadfe41016dafd70cf3a72afe4948cb8e5e4e3c37
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\222b3102-b9a7-4236-bb83-ae97500baf79\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e7264e75-cbec-4951-af36-9bc8fa63eb91\index-dir\the-real-index
Filesize2KB
MD502b7f0ba084b98ec1fb024f4b4a34df4
SHA14b0376370c159c47e87b3bddb7d5eb0ddedc5e47
SHA256de6e6cffa9d45a9be788b3cad0e1331d7a7f44cf8d63876766c7922628822a58
SHA512f4fa8db737d5801d3a48b177d2f7dcaf89ee17451fb4041d9f2f30091a15034d6519ec4309d2a0df62c62389e7e845adafb660fba4b4352ce93952c694ae8929
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e7264e75-cbec-4951-af36-9bc8fa63eb91\index-dir\the-real-index~RFe58ba23.TMP
Filesize48B
MD5037907d3b51d6b55e2951f6a7c018114
SHA1871b4f0873f0b72c3a3ed9e4c99cf20a306f21e4
SHA2568c9302c29632ac124fe0d77e49627ba875f502b964c9a6dc63446831d90ae840
SHA5129174492495686faf918a811bf74bc94582530e794d10008dc8473f4f7d613e59da7c70da0a7331f588128845b7b1266dbbd1e99ff5aa4428d41f64bf53cd3f02
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5dda4ae4f1dde31535961d72b72de574f
SHA1383e3cc2a365d50e0e9adba39cd9ff1a95ea004b
SHA256aef5e7780e0dcd04ac05f5efa0b9f63e2d284da208eaaea0951d99b738452163
SHA512d215b3f5b4ab1f917bf4daa910bdf5c84f1a49083655c3767051fec18d91742cc085b680ff80ef520791d4036d37ffdc3f05d7ac02bdc65ff4d6a03f6ede6850
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD59d848d3d18b988ab60f482a2fcb46288
SHA1249b3a43e0d0137f19678013f27ebf3f26e52ccf
SHA2563164f8c95ec989359893ab66531335aea5919de7f4c79d1c45aec45b89cf0552
SHA5126df886edf4b1935d462e1fd7a7d7b6c0abc000fb3e9df3e751aa47f7522d80fcf98eae0850bc6bec5d7c0591637808c80fbb84a1f721456bac82267b112ff709
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5767f0a9b75192c90570dc3535552fe67
SHA1cbb5fd4558b976200ec287c41cd490da18bf3f66
SHA256a823491cc0a689904b78b31f4315f26b5e1e350114f7a06a5661e26a6d56e8a5
SHA5124e8a8da8ace7e2a779166763c303b1d53071ad24fc844e13b77e7b2e0f16595c586fd5888f91b06e71c1444271ff1c5ea3a20eb3e3b6b40324c6bcba287bbc99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize178B
MD54886c45cddebc36e225f25f0785be57d
SHA155e51383a9491000ee1dbbf9a2514be8a89acdf3
SHA25666cbf524801cfb50877b206e9362856e2bf0d01e994908a06112db4deed46e11
SHA5121bace98e4599c05264876f5f644ef54a6cc45db8f7fe3436d14f51fe83bc3295c7ada9277555b482cf145f957b95ffcc1546c6f241eb925afa38fe15b4d08736
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize187B
MD5742ae572d4e5acc53cd7534e2af6d180
SHA126f2666d3b129fd29a69bda590fa82d0cf470e3c
SHA256231a67b8ce50c447f01cb5ddce9e4acbad2a25a3a2b7bba8715d02ceac2e4e26
SHA5121430087e3b092fcc27fccc33cc8ca019a7013772842897eda863d8028ebabff74b996c1539e9de7804515171e707683b971946539323cc49a3e8fd5dd5896dda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5870d6.TMP
Filesize119B
MD5944652b2b67e3e38c5e018cc2b72107c
SHA1c5369b8c37efa1090a20c6aa640a093de8001535
SHA256d323c8cb2e10686a8907515d586e79efd4a7837ae24d170df61e676c0bb4ef91
SHA5126fb31842c7bb00aaa43a065b8d34702425536700e8be5a2eed1dc9f5ca4830695a99243378efaaa637ffa7723d2faf926eff7b2b24d8a7598c1912611eae94b6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize48B
MD5dd1222c51bb11a0bdf72382137956d89
SHA1c56703de558c6b407a0ef771456ee939a31c7588
SHA25686258d0328b1e5ae86225e3093a76923c47c84ffafb70a13a132d394d127354e
SHA5124eb4cd822f7b6205eebce521f67ea35af4949cac8e01ef312780c296dcf98efaf8fd6929cbec1bb47b6af99bee739fbe5954c52291cdd6aef4ad6e859daced83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe590834.TMP
Filesize48B
MD57091f6ba60e94d125f5570e061d6b599
SHA16c8ff949703146a133a81d514f85a0937f03b526
SHA2567b07e49fabe483602a1efce3a62c4ed7d4f319bc8952e2e9937fc8ee71822301
SHA5121ea0753dd0a49a201b89b55b2cec125d36454b46d79dfa45cd51747988b68a93b18cd24477ba0cf4c56ada9b70b04d9bddac2003b8722ec1abcb663712cb21ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir5024_827282109\Shortcuts Menu Icons\Monochrome\0\512.png
Filesize2KB
MD512a429f9782bcff446dc1089b68d44ee
SHA1e41e5a1a4f2950a7f2da8be77ca26a66da7093b9
SHA256e1d7407b07c40b5436d78db1077a16fbf75d49e32f3cbd01187b5eaaa10f1e37
SHA5121da99c5278a589972a1d711d694890f4fd4ec4e56f83781ab9dee91ba99530a7f90d969588fa24dce24b094a28bdecbea80328cee862031a8b289f3e4f38ce7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir5024_827282109\Shortcuts Menu Icons\Monochrome\1\512.png
Filesize10KB
MD57f57c509f12aaae2c269646db7fde6e8
SHA1969d8c0e3d9140f843f36ccf2974b112ad7afc07
SHA2561d5c9f67fe93f9fcc1a1b61ebc35bda8f98f1261e5005ae37af71f42aab1d90f
SHA5123503a0f4939bed9e1fd5e086b17d6de1063220dffdab2d2373aa9582a2454a9d8f18c1be74442f4e597bdba796d2d69220bd9e6be632a15367225b804187ea18
-
Filesize
292KB
MD5e3e93ab78b5cd767cd961078981acbea
SHA1c89909e30243c68bb00e93bf1c3a1db20f4eb8a3
SHA256a176e23d5dd6af36770f1ecae9e773b21103d91a09c7404931ed30c0a6078691
SHA512f8c718e840e7b480f82bc730656c98b9cc884b618c10f2e3532891f2882e8dd37e0bc43ba824d785cc78ad64aa9eec63323051ca1e85898346f6451e042053b9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd