Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
495s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
aa.exe
Resource
win10v2004-20240802-en
General
-
Target
aa.exe
-
Size
19KB
-
MD5
95e7c07f6c76a4bd65f911c2532077a0
-
SHA1
b8d315964cbd4211938c4474fd1bf53588408af2
-
SHA256
be539a6aacf06ef38497d3adc4837c74b6dd28a2a57c4e98e29f2d89fd9b8921
-
SHA512
ae4963c10dc70b4a80288b9100c07d23e3d6231e60f30483aa5279ab2d9c49b7f35e02604a1d76e04ea07b1afa1111db34e721bae4cd107c6d5e374bcc6c21db
-
SSDEEP
192:AV7qaCF6Op1t2dobVXujRDcBaXWQjwOT/2W8iXsGWF8qa1Dojjgi:iqaCF31cix+Dc4zjh8i83FF46gi
Malware Config
Extracted
cobaltstrike
http://130.61.59.1:80/9fjT
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MASP)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700575910317991" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2716 4284 chrome.exe 115 PID 4284 wrote to memory of 2716 4284 chrome.exe 115 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 2796 4284 chrome.exe 116 PID 4284 wrote to memory of 3048 4284 chrome.exe 117 PID 4284 wrote to memory of 3048 4284 chrome.exe 117 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118 PID 4284 wrote to memory of 3644 4284 chrome.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe"1⤵PID:224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1284,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:3232
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe"1⤵PID:1908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbf447cc40,0x7ffbf447cc4c,0x7ffbf447cc582⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3144,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4804,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4880,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4580,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4460,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3484,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5212,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5380,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5480,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5448,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3660,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3264,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5612,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5616,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3460,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=4024,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1188 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3528,i,13408970012120627557,16417262891641787367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3708 /prefetch:82⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1388,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:81⤵PID:3988
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:1504
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:3524
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:3932
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:220
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:3608
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:784
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:3556
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52f7d37422baf3fcd6b26dcbaa5ab89cd
SHA12693ad44565f64e952118fbb4291ad12150497d5
SHA2569c55a4073be38f55970cdc793b311eb10425b4e6f0d912f8bace3855fb433664
SHA51274d5d73ade15a277308e0e7b156976be4469b34d36b297b6a988ef2919f37bea9d6ae3036c8fef33fbec54575aa804b497087f5c6aee297dba901fd0f31324bc
-
Filesize
336B
MD51ce22a2b6885fc7d97f1f293911770cc
SHA1c329b5a6e8dca9419392cb6d19fc964bb43a0293
SHA25611cb4ff33f4baed89b9833bb917b7e3fce34f5f4e9019ff39937523d65510198
SHA512c3b83f74548ad09af92f591ecc09ba06c25c8de38ae1386766c656f7cd8426d1938177bc3188bb23ad0bd8cb90b3fc74219dfa3ef55fdf2a77c3bdb7ee4d0f23
-
Filesize
3KB
MD5da5a028c00f7696dc70d7d057d0d09d1
SHA1e397354503ea0bdc95342184f52ec4c441e73172
SHA2562f3f403b1fcd5322055a26fb3de11fbb0d92d1bf39a79bc236c9c6899b110f19
SHA5126e18da243111e91feaf41a92028139fdf93da9e7b6391a60db9ec1e446bc3c5dc2dc31b485d734ed57f288aebee274a0618384d9e7083fc156835204c12fe02f
-
Filesize
1KB
MD5921ce8e01f16150c2ae6be638e5f700f
SHA1451afcdaced173e9e5d010e14d9c244b7a70448c
SHA256584435cd70d2850029cd1bf23800a80b12e90e94f2e4582f5ed5870a70cee3d7
SHA512a77568bb63b565032fd479cc5c1d393d4ad4dbbd6becc6a95586b6391351c0c37ae94b64b3dba60761cf5e8b6ee4d6aad976424d9e0aa10a07c8652c4a6fa040
-
Filesize
1KB
MD5c23e18f4a1d4c9b843d973d2c64d23a0
SHA11af126ff4c937e7ff6670bfae89fc71efc2aafb1
SHA256e3427e08aa33fa2e78e3446da65ced0eeead86dc1ce4875b19ca5dbf5a97b6a3
SHA512c3973fedd352afcaed1aab3df370d3548fcbc1f934eaa8634a5db0c91a610561a0a8742b8cafffca4602638cfa0913c0c7b2e083e8e6a3b5088c87d1b5fefccf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
686B
MD5c04020eb2592ca4f9accb34f67277e4d
SHA15812fe4e9a36eedc3b81addf4e7ebc9ec54f631d
SHA25627ed5d82dcf751a6a9a3f9b9b03d9909deb2d6ae615c470ebe143f45a848f8c0
SHA512deb05d7d8ded4f14de5c73ce4a915cc816ec194b09f40195553fc8e3b7e4b6f2f2fec9f4388cfa9d68fe48115ceb947278fe9f3d10be80946974dfecbc34586f
-
Filesize
356B
MD5bab9df4c09858b43b69af9026675cf95
SHA1e5b382d57e3904461d58347038101353cd4c6078
SHA2564f6adb2bc51f47b351cada1bb16943be444c9e262552c6e29355538c5d997527
SHA512ae6b33f443fcbb0d4f813a33c82e23e9afbe0f5ee2ca61814750d6c69530bea1aad8db798a894c5fdd07c319d31134c91cb4cad6c019d6a8953a206286782280
-
Filesize
356B
MD50cd9dc485cf4ce8461017f596adc3661
SHA1bb341b79332be5fefea4a68c839353b4a6198003
SHA256481afdbb6d6bf026ea2594609f397db9de94ae3813c22e134dd05127b09c8f51
SHA512b57f59ddb98d20b3dbed3ecc4979e7eb1a3977dc48d875bc84344bc99c895d4ada32d503af77f61ce9bcd0051c955a9eecfa7a32d6746d1ced006ad5c29837e1
-
Filesize
9KB
MD5adff111578745a9aea70f2353f1a351f
SHA1cab9d1994c1f8568c82718cd69b65f3fa07a76de
SHA25645d50e93ba40375a9b2d9fd9938fb4d8900abff3915109829a1df2ae92464922
SHA5120f0f6bc6dd9faaf8a902ee9f531e55cbc80080bd0a112053ee7a39eddcf6a0678e73698d4abf21d14de52285ac3de8d61afc45fea1fab3f960a62395b2e9d9bd
-
Filesize
10KB
MD574eb8a79f868b8d3c0f939763640556a
SHA19f7384acb0ad3e21465021f105774c485e56a29d
SHA2568572ff132620ae7a426bfd992d493f89d8bd9cddf22523a04fbe6e4000e0c9e9
SHA512f77a4c6cdcb74a3bb3736249b9cb0579a5075da2e24e992dfaa77cf4c92c7e42f3c1a2049e3b9cd3a1af5361ceb0cf065388e84dcc5a5e133d32b87964894642
-
Filesize
9KB
MD57b1e5884f0a3ecbd7deaeecee97a1fbd
SHA10dc1fcf74acdb699ad14e65845d50dc7e332184d
SHA256959715ebc103e1339620db32e2e7aceab19d817aa0367d4d45c043d6271b655b
SHA512ea8f0c24b52f1a39cbfaeb9f3ad6d104b8a916aa267af2dc9a5547be031b7d6c919fd3629e5de94bbf171a56a480281f309be45f64fc6bc3b2f182025d5cc41a
-
Filesize
10KB
MD5c59564bd6b8df0b169b178e6bc0e475e
SHA1fb294ead51ba95b5ba8822e3384ccfe93d412f80
SHA256f31a491e1c259ec47631bf974030c232df27d30d969a1c8990e99e127f4e49aa
SHA512048239f5b32c65762e32a4efc9f00fcd6546c5f432347b709c570c5e0be82fd8d6d036bee6c10ed48f1dc1bdaab8a29f6445fe99fee6b34ca630e49c45fb1e26
-
Filesize
10KB
MD5c5f8ee1a466a6f15c8a6a4ac3a8c221a
SHA1e5b13cd3aad678b6b609a53e5332aa9d6d165270
SHA25679c140e9b25a92596c013a59ea50a4568014334c4c5913b9bef30bae883686be
SHA51297ff2bdff332f7fdf815d4e14c1f751be87ae50b58fdb96ddd3e30f9fd0cdf78c557823e7d2d65ac6725a62d38f8cefc47af2c5e8beed44595be63fa49bb1a3d
-
Filesize
10KB
MD53aab9fdefa92ec2238c79e9fd2452daa
SHA13292d54f24f9da78bf6b5bf6456d8a84c42fcd58
SHA256081fa7d87b6aabbf4cd7d0f74f455b3f4ccb32705ded7eede3e3ee3e3c3b35a9
SHA512887d8f72b7b37de665183b16f3c40b78fb5a50096bf8ed3275bd5f347e70d12754eeaae6f5324217a653852ff0f7e6c60660aa6c7bea37c5c3fc7b95501fa054
-
Filesize
10KB
MD5b381f203c2156133b731e9e60956c8b1
SHA1ecc26361402f324ef5fdcc54795f1f7c687ee0e0
SHA256d76abe7c5cadda16112e7eebac88cfbfe51a6e34e0dce1d8d23ae16472516ec4
SHA512b2fba7707558aa0d9c68345e8e25dbb70047d5a3fb2949592bf9ab7c36337796a0e5527454efbb6024cc8d04b13397ccb3d422e1b74e8ce34d672696f85c3ad4
-
Filesize
10KB
MD57be3be1867ef5c547c2d99568cd91939
SHA136153eb65fd232ad18614117617f2edde6e4913f
SHA2568932e13fda398b55179daf30fc23915d14ec3eb7b731c0cf29d497e944dff199
SHA5125864d36409c67125db4396bfcc501e2dbb5873e36586749bf2d96ec81d3aa65812fceba1265d3a844e420c61e8a0fb8d5335cd019d7a8d598807e35d969485ca
-
Filesize
10KB
MD53cdbe63678fbdbe9726d840efc674e31
SHA159e9aa8202cbe6c68dfbed443e948b417d0e58ee
SHA256daff6659cbefcbcc8779d287e46f125e22634fb45a3d713595eb9a2e33363a34
SHA512470693796f92e4feb62b9258dbd822b7808915a08f8b7c28bc4ce8cc174686e738ffd04c0c62761c13cccc4c5be12366bb9e12ff36cd7440c3239755cf298a49
-
Filesize
9KB
MD574b641b72f771a36600ce959bbedd656
SHA1abadf7e80b6429b754289f49bd9c796738c84b05
SHA256587706929b89d72c7094bb7ddfdded4cb623ef1260b35cc6e2b9b80efa73e645
SHA512335abb5ede21f328959f46a90dfe0d39f29a168d7a9eb13180417e33d201495d749922e247c698f098fe8c97c0b471844c491050a3b99a0a0018c39a378e0ad7
-
Filesize
9KB
MD5e48607a1c3f4dfcd84d2872ca4b80160
SHA1628dfed3728e0f4017c05d6d0c3554590472193f
SHA25608d04676af281fc6956b91997ed85e30d98788af26ffc0c05ba7e629899fdd58
SHA51294448a1885d9ded4ab6d4ddd879e2725c0e8c8ce278a37bceabf5cbac2c04b487acce0dca70ac0cc17b504be9c8022e890cbccbb8c3174e0dae0ddec0e2ff793
-
Filesize
9KB
MD58261665d198298571fd65823847fd8a1
SHA1d0dff535a808cd43bea32644584e8436d2be6475
SHA25631a756966c31b69e4ea6fd6e39f26214c79bcccfaf85642a4699977a26bbfdbe
SHA51229ce20dae86a7c7e15888739f5724f3c89178a65683972d10c6f04bbc93b4b5c8b489bbd031f07f12323abdbcec4caacf448c96fe89ec85ee56774e16d89f883
-
Filesize
9KB
MD53296e9d09bc78ca86ceaa9117ab5c2a8
SHA1b38335f52ee87feedd6746d1fac52a8ce95ed495
SHA256d3b0c64e34b3ebca94aa68a6cf5f942f22774308ebd45960284c845b04ebfa0a
SHA512f69b3fee4850d35f659e717a6854e0ed5c717565f9e99cd70e6085c8d3b2913935de22cf7c0e3b684dea7c4f955ef0de670f33e19f705864f49036e3cd714678
-
Filesize
9KB
MD53ed7ae06d4d5be1f195f011013753066
SHA161cdd8b43e1ada24b9810949939841a3354e9031
SHA25698ce34f9ea8e069bfe70ceb130bcb9ce9dbe368a061617058dd7e390e54a7333
SHA512fc5dbcd2100d01d6697425fc23f24304189cf7d1238cf9e8a3947e8341c39b89efa95509819ca67b99dade44d333312097a3a7fb15d55e02e53c0b0802ba04f2
-
Filesize
9KB
MD5738fda97400246190bf2ffb27bb8a96d
SHA110b23fee3c23bdff21c39cfb75724ad4bef359fe
SHA256cc4f55f8fa2b2a120a565331fcebaebec763d14f39c263831b5751475c365062
SHA5122cbea18b23c231f3668c3939179d314d8e3a194e240220dce012f08ed1aa86158361cead40e104ad502cd89a5ec01618aa7dc188edec0ee381b440a6d2a6ad6f
-
Filesize
9KB
MD53fd334c791ab1b35d3470ca100c5caaf
SHA1afaeaf958caad97a582b068ab1b17e479c6e171c
SHA256133d8e753ca93c66730e1b59e79b4b72377c8a625aee8bce9e1804d6fd122119
SHA512325d88db0941a523484cc536ed26ca343d3f9f4a5a2cceb4ec59d1096bea74d69b862628526007077f86a303ecc585222a621d4d3b07b0fa7567e44f4df2f5ff
-
Filesize
10KB
MD5333c5e1bc979e18b0af4be503785deb1
SHA1bd2db902af6c24c7ec64276b67f09bbd9f3cba10
SHA25676dbafc173a216ff3a5a2e4752e74ab68d4e51cad0a4e6a276cfaf893ba1486a
SHA512b405881ee2df31deb90cb1f62fd71476ec5d958c4998ed5b923ccf662ddd0f25b461342ecfa5c26852ae6a8ea0048fd7990e31920b95b9ce9fd7de0009073867
-
Filesize
10KB
MD5d942fd78c834482d5ed19b96cea66409
SHA189aba2e47b95f4277c7896b5c0376e632be34440
SHA2565faade13b16ab630b3025a38b11c0dd64764f43f18b3b707caf6397b9237057f
SHA512288dbab6116b30086d25f5ff40c1db2389cc4c02aefca7a7d441b10add75e0d70682e6590c02d92ebc2d9c43439bf22b872a6bf22ad06ae089278e424a349317
-
Filesize
15KB
MD55373fb32b76d981699d5b2e068e44224
SHA1052b27b10b359e55b963013b7988e6ec2f7b25b8
SHA256ec5582d0c58acf8d7277abfd7a689dfc2088e79daff569a6ce8bb5421c8401cd
SHA512aee782a7d3294497e8525fdb4f53ca4a3ee3ca01e9271e801d15db2d7288d3a33480260ee1ab31f2837304cfff22ea6dc7a5d51f7f2c9809cc31dee725caa7c2
-
Filesize
205KB
MD5caf490cfc9fbbea1ecbdab43d643b031
SHA163b835ecfb5096a03caaa8ae96b5e3dd7b0ab141
SHA2566364a6b2d085dde1953f670548585de64e7935e4aa21c32dd8018a0224933601
SHA512878a9b6a365b9a0e545d186f2b223cf2670ccba1fa6d2f415bd6eb9e39eb4045dceb70d8070a816c1fee3f9eaaf95b75f4fef0e579069616fd5f986a2e1306b3
-
Filesize
205KB
MD5f51a2e930da1b69d2cdad1f70d479d52
SHA111b049440c4f284fcf73064d78846c56e4cba6da
SHA2566d69fdd536995cf27292d44b6f95cbb13e5ee7fedcfbf247099e4e16d6d9c7d9
SHA512b8171e3445df557b378bb182e2c763d8c200426b10115147e5319e9d9e9e4a4eb1de6af3afd0e037a5ccd56831ac36f4caed7c5ba3d2b20e70221ee6ca1c4a5d
-
Filesize
205KB
MD5cbfe7a3743f9795f591fd54b7a823cf7
SHA1d057e4ede51e428b3e51bd00b6e6655767c23a3a
SHA2561cb6136f5f79ce1c071366d4d69d9c9ed0aaff5fd70d04d39857569f63ae2c7e
SHA5120dcfdb7f7c26287c319c88f36c36c3cfea90227e0485653baf601956f390f5dad593f57a9791584dc7986068fd1bd7f9424aa96e4d4ba19a93d86bc3e2c0b193
-
Filesize
167KB
MD58f1f0b06b88c8de7eb823c2ca97c7d56
SHA185685a5d5ae4477c88cc173f56b247bdcc175271
SHA25657129256e7216de890327a1575ccdf19ca93642395ae51377654dc7db2a11743
SHA512313022e306dae2817897885ab4dcd935a341a52aff9dedda10a0762be2049f2faaeef9f5c587deb1be0be602c3606592b5e54a53deb7bf198c156415564a5983