Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/09/2024, 16:13
240920-tn47csvgja 620/09/2024, 14:59
240920-scw6yascqa 615/05/2024, 14:53
240515-r9nqdsef36 615/05/2024, 14:26
240515-rr2jjadf66 615/05/2024, 13:07
240515-qcwt3aag5t 614/05/2024, 14:33
240514-rw2ebsbc52 314/05/2024, 14:28
240514-rtgbdaah6w 114/05/2024, 14:17
240514-rlvh2aae7t 607/05/2024, 15:14
240507-smjzcsfa79 707/05/2024, 14:20
240507-rnf4esde64 3Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/09/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-04-11 12.37.45 PM.png
Resource
win11-20240802-en
General
-
Target
Screenshot 2024-04-11 12.37.45 PM.png
-
Size
25KB
-
MD5
6b7dc856f8c243f6f19b6919f9c3a1ce
-
SHA1
8b652199f0126eee7c36304046510f4b8b544f5d
-
SHA256
b2e3b3edf52c7b02b128beba207344ac58d9045076a3c3bab471a4b1e0a7b5cc
-
SHA512
68528343cd7bccf0ec068afae317ac0201d2556f7aabf7fbf6a4e843669289c4de1115910af54d3c9cc3e806104efbf1c552ea8a2ac9195bb86eae7917a2fced
-
SSDEEP
384:Tjze0/+KycJrKUZggOdglJeysrE6tuY0ek2YB+iLIJlph:vzB/VPZ/lOuY0V93LIJlph
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 122 raw.githubusercontent.com 123 raw.githubusercontent.com 37 raw.githubusercontent.com 120 raw.githubusercontent.com 121 raw.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133713224121585951" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3761892313-3378554128-2287991803-1000\{177C43F9-2E83-46F7-9B73-C779A1992BCE} chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2276 3680 chrome.exe 82 PID 3680 wrote to memory of 2276 3680 chrome.exe 82 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 1376 3680 chrome.exe 83 PID 3680 wrote to memory of 3728 3680 chrome.exe 84 PID 3680 wrote to memory of 3728 3680 chrome.exe 84 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85 PID 3680 wrote to memory of 1200 3680 chrome.exe 85
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-04-11 12.37.45 PM.png"1⤵PID:2876
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942cccc40,0x7ff942cccc4c,0x7ff942cccc582⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3588,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4604,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4488,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4508,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4384 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4432,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3384,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5200,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5212,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Modifies registry class
PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3128,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5660,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5640,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5636,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5784,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5964,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4500,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=868 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3528,i,1377439949229566233,6351371973938254350,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4312
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004E41⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD53c2b8b63af205c16cf19305d551bf296
SHA11a2e82ca4a4b64cccefa2526d5f42c0df2250b6b
SHA256f42cea81cec94e264a7dbd13a640833a029782c82ff53510bb27d2e8567c0c52
SHA512a21c913bdb622ef4492b4df8fdc33f4213d0ffb41e52cb20f6fe1c7983cd7910783e55dc02144a5399b0d8d0718fc8f496fef9f92af68d7e1394deba2dbbda4e
-
Filesize
649B
MD51fe3fad5e273f697b97c69f352b2516d
SHA1c4a28f2e30e7613a63cb26190100713137bc9f92
SHA25670454d38effbd2910f0d54814dc98973cb9dad1f823ec351563115f8c0130fe0
SHA51257b59e35d4ea03783802cca8643e75ed1d9863bb5ec00b1b4dd3c250b470726b09878c251eda37d36502f6643faeab56631643e3dfaea768358897231dd15fdb
-
Filesize
1024KB
MD527ffb870bbb090d6023451e2293dd56e
SHA17ea2de7c5e997e0d67fafa09b06dda96c70ce16a
SHA2562195411990dd0961afb846e7393d6925d1d548a71e969d160511db603b5cdc5f
SHA512ece5c3f59edc01aa3ccb3b98072e6d6df3279d9617a1359b2e8ad3aacc4755455c1d1df087c975901135c368cff427e2d86258791dadfb67cfa905f2bdbe3b4e
-
Filesize
3KB
MD5fe35dd3fbc3550becf6e51811abcf422
SHA1ede55aa6c1e75462e991062c91ff378a6e5fdde8
SHA256bd838f1eb8c64555020bcddeecea0f5f61201bad2f925f3ccc069a3e180fc38c
SHA5125f59b52c8b19e754f932a973bb530c8e44e87f2b019679530af92ffa9aecb0c3da936d9191efe6948915c8abf09b7f2ec0facc3e9bd2631c3d6f8b4650379420
-
Filesize
9KB
MD5044b0c2068dd0aa17cf15d48a08ada46
SHA1913a80af84dc84581a2f90ea37fd847940a66476
SHA25654ae6786a5a607c1f6c55e5a5daf7ad0117ec3cd43eb84a490333194eb9c08ea
SHA51279049978197faf5002325eb65db58eeba3f7dbd3a57c5b37572d053b4defd4d36731703460372906f37f1d2c969898c1e7f057d3da1430fccd2473419133fbc8
-
Filesize
12KB
MD51e2ebee20aefe617dba44e634abed4ef
SHA13505560574f94def85ada5e2df303a0c19cc81bb
SHA25616143d9073eb9dce98dccd6203d1854f94da48b6cb2f85201f99db23ec96ff3b
SHA512790f6ffb368f65f193ad91bd8e67c074fc70f8f52af72792dccaf339bfecc16dc641280c6b8b43d2913c5cb9c4233aff1211c500919801976e077750cfc2bead
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5d4c479eba2d71b7f25e3371c4864c2ee
SHA19b660a95dabd2c05a55084c27563143a179780c2
SHA2562e192295adcef432e6787394e866d8aacbb81fe19630bd19d6346ba9c3ab70ed
SHA5127d51001983f06be7c794ce09b16620bde4a10c5bf61be08fbe6e47a6663ecd018643b00be3297de598940d6dc4c6043d7c84dea962ff0cb744304553c063d216
-
Filesize
1KB
MD54a32eae688ca0b418607cb6110cda5ba
SHA10fb92de0cddf6322130a3aeccab87e3db73f94a8
SHA2568faf1cf9f2dc84aeebdf4950da0c4f8644848e638c490bafc03b4a711d788e08
SHA5121eacd223ce415c0434efc9a1cb8931394a9090e6f186e7feeb430690eb168e3de8e348f14c64cc2ff478b57d1e5bf2bc22f472d61a52215c28727f4b01963318
-
Filesize
2KB
MD5c567370fe53a3cb9473ad182d46faa91
SHA1082daa8f2f8020f5528879bc8eef185c9674c576
SHA256bbfe283693b419e43f72a53c33f758519c063f80c7ede04a6e675b9c44416066
SHA5129900226a6ae499f1f7a1e67768871ee18a10182b6d94125f788747f60b2402adcef0a92aa00d1330ad91ce3f12e8eeef6eeb0b283cc4c8a4440ebc36415a2c12
-
Filesize
1KB
MD546e4deeb96a085d9b66e4759c59998e9
SHA1d4e85e36fcf7163457ddca4e754c71c4f4fb22df
SHA256822055d76c15728d8f6537146ea4bfb9435ab80cf0050a9284714a883310bfae
SHA5122de9c9bda6866fe44f36ccdb1e8dfd14006a6295a1e2408d8c8356b9db8716abcbb306c72e900e1998098ac1066d433e0ff9ed0499489b415171222279586080
-
Filesize
692B
MD5a4336563918ef68d88ccfd6f0e448b46
SHA1b51499635414cdd8fd0513d46674f6eed51ee86f
SHA256e4695e141aab6c16be1fc678f68d6c994ed06671ddd504fd559d5b296ca053e8
SHA512f2d0d38ad460b1fd61c37806b3fc03c48a35c4a8b53e48ebb8766aef4b5ce2d9bc0b7a1d7a39f6dae9d79a72b306e1ba88f808841b7f08ba24cbdaf7b79e749b
-
Filesize
2KB
MD5f34354dbfeece547468bd7d9e8f55f35
SHA1d21470c987b6f361953238480d33275a88a6aa65
SHA256dc6bee07fc8cc59a9e003350886201ef2d763a866e4ae4280d9d154ee55ed57b
SHA51277e10a5dd5f20406418aa04aaba34f601deb9a0eb778990e0e319c11dc6d0b1aa27d700fee6179d88beba4b8397e9c4420ed18811a7013efa3340cefd30edb9b
-
Filesize
9KB
MD5654e7e034770aea9a40ef66e15e44eb7
SHA127218bd44ef290ce836abbef708cc5687d3d7cac
SHA25631ab3aac53d9b10735d4df56dbe7e9b76f19b1147368aa175d7aff7a043d4517
SHA512818327568885aa8436acb38529019b76308655582d9fc8ccfa1afc0871339521cbfd6fc7f04897a3cb80aefc1e1d0d3f279919f229be289211b50724ef021c87
-
Filesize
10KB
MD595cea94e61e05ddac252df452c71d68b
SHA1d574b11429dfc2a4b88b36912c88ac96fe69b3d9
SHA2561eeb9a9934edfda2b3a8d255ba3222d04e06d9d23103a655b9ab2c967eff698a
SHA512a1ec571d958edc1a8f7e3b577b2b10f3ac0b310dba8c5b33d470de4d0dd06351791f2dc509a5da5f8560acc7a442f03780c1ea7853621a050f1c501bb9e84dca
-
Filesize
11KB
MD596e1530825d3c346df8d726dc73bc600
SHA14b7f2b3f5b398f9b26abbbd91c7e4f159c3a2232
SHA2567e8719cfef60a220ddaf366b080fab4a886e8340f6f3b7d35ec136f53df48fa8
SHA512296d632a05568097469bb1eab717e2e6ac6640cfef8ffdc1304e7daea9b9f129acbec5a52b3bf0fb74a2bbbda27db81dcb33ab6a5ffe1a3c4cb287f5a90d87a2
-
Filesize
11KB
MD5977f9c216f6d0cf6d75ccf8efeabaaff
SHA1715ae5b751c5140519802cfbfb501330fd51da7f
SHA25609c1b62b59165f5bd85c45f1782cb07df989fa6bcd9dcd68af91ee466025d3ba
SHA51228ee3da87dfe8f45f3128b039080d9b8e67e27be604362d9a4369cbfd9081417a197d8a43cad05abc2942b4403610dc1c62a9244724d02d9c5a291a4f3529f42
-
Filesize
11KB
MD5b12c19e86a96c3ae65b14b32454fb79f
SHA1c6ac6e4e9f2d05c240bb47ca6b6067441056db62
SHA2566c04688233a40b64d20a5279d4e830185942cfc98e93abdd9569a082dbe32f59
SHA5126aacf64f773ee4d9f70fcae93f172f1b91a3c2cb38e332eb5f258554444f4e7709aa93aad36587885f0c040bd756cb57f9354bc181f449e47df67e1b8a31ecf3
-
Filesize
11KB
MD54cf39bba6ff5252a22badf40fb7a88ef
SHA1378639c13ed20aa79e0edfe7451d4695c1b788f1
SHA2569202762e237689ab93a2d978a4f79219ec2fe2814bf45601468ba652f2ab38e1
SHA512afc23a949181fb53a5f80229a6407e9aa68e6089f1dbb22f06d59bf6e5865d0f254e9ed7012d77dc422799cbde9952ca7af20b248aea9e9334ecb56ff86bd717
-
Filesize
11KB
MD5a1fd5e3cc45bd852d8b1bc1aaad89926
SHA1d596156af22939a669cdcbe38bf934a7ad855fe1
SHA256375a37fa8694b4c8306990b1af7c45a7630989fe05ff4ee62adb1898cbba6ab8
SHA512733e28bf3248913048b8ccc10efb0b5bb7a927941b78f3e25132fca33184dc49f5e52c848d185b1a7d169a793718dd13c77e7c4d56d5471180d6b2f16742c39b
-
Filesize
11KB
MD565bb2c84110091723f1f665e098c6412
SHA148f3429f55908c1278b37e99ba89dbe538ec4414
SHA25636442837de2e6ba1fc778bf19afd2859642d417112f39cf92d550325f99797f4
SHA512a73b039e653078c88e295d3500d82591c9e00ea6bfb3d4bec07fe41a57118e7d91ad1e2f19d8231e8f8dd10c661d515af9c2673f0591f172994bd2a33a43426c
-
Filesize
9KB
MD549dba543a99724826a0872d9e2b968e4
SHA189f0d9c35e2f32b6b3422d161319da7d75984b74
SHA2560e9e0e747d360078caf42ddb99b7f2aac48cef9f3831626294e87d8420f44df8
SHA51234c6696a3413672fb4f92f97fa5f45dae2f36f272f038ee0eec01cf1b28a7767d1ab58ec27370c4798c84c335cdef197b648898edaaf1e385ff12e07e47f8a0a
-
Filesize
11KB
MD5f20273d0bfa87ca4efb3986c1bdfd9fb
SHA12fdeb99504f20c0d1b945eefd02cc0529be00673
SHA25672824745d5cb9ffa31b6d5b6fd765804228340c65f81cc8e98cf25772a28a7a9
SHA512a391f3375b111073b77b3b82d14539d0a5ee3f23eeb9534b62794278ddb6c930aacb7436b1d4b1c0a9e2cfccb92aa2e8a0f830635406c727dfdc5d059c60f629
-
Filesize
13KB
MD557898af9535377aa50be19e53e12898d
SHA18b549b1c19a7ec4446b4961a88951aa00d3e42a2
SHA2560da07f54b2418ad5466c1b30076bf125d87d9b8efe732b63b60ff35bf798c736
SHA5129d4129babdd61e5389713d0692d89c7489947c3a864a044a7e2cc9b900adba61b6390cac38f65c9436d24687925de9d9ee6130d791d3e2d85d529d249000d3ce
-
Filesize
96B
MD5f7335e63afb0a92a62fcc77537c60327
SHA12959e2d861d9eda0aa6931d6ff028530d10e2699
SHA25666435d6e8a76891987bc320a22b8f6c31ea6a98d30425a8b341e7bfda98c3d15
SHA5128a55b69a3f17c3fbe6c5697c52c15f5e1898e0455d2e14b8bdb016f4108a66b3ad5ceb2f1b0f7f581f7244041254987737ae820f2310140b16488ec6634ed3d7
-
Filesize
160B
MD5e8535605227b6f226de6a8ec25299749
SHA18dd8a54182e1b44f480de750df13f4432b77742f
SHA256131d42476e29da8c936bb781586fd156098d18c6b7f858ecff8dd913660b8151
SHA51286861307ca51d2aa8cf4ea8f9327fe35d53631dcccf3484a9d3d184a2d16d2c12083d6a0e40255c6ad6f21fd80688e1dec7f8139c15e1e2ebdf9751a1ae754d3
-
Filesize
160B
MD53393b6f3ec4c784d191db2f0d5034416
SHA10a7b51fef53916c4b840b1485ea7da182aeb47ff
SHA256c0a080975157306a3ade3299ac5948f8425d029de50e84d46ff3937138bd734f
SHA5129b162b9c71ed24cc86660c9009341cca03140abc8556fd468adc2f1f2f756e7e71e3ab2dd8e649fc0106bde58b01afdfec3437aac1f0f8b97f86052d0a7f829a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe58cf90.TMP
Filesize160B
MD5a63dfd9559094a3add00159941c7f60e
SHA1484e157a89d402cdbf40e22f58eb9c2dd96d6be3
SHA256daeda7068a42fae3510f010d7a678478afb628722096d491fa2bf8208b8f8cb6
SHA5124fcc068468e14411dbd30d5a123d4ca4c7f9094051fdda446ac78b49b688af8f7f999e09d41ee94502634f13bd173b8d05bf2c22629d0b49f1c2cf566986a370
-
Filesize
101KB
MD5a379894cee3bec54bf960ef304dab68b
SHA12aa181f1ceda743ac104445f0cbd4fed1ebd1fae
SHA2561bae8300bd1090c5e8724d8e72ea9c2c4c9007147f31cb94727a87aa3b0e9a62
SHA5122afb84ad08c270b385427f6f945cfb0c20a3e63275016ebd7274b55e0f465f63752ab2c9548aa7adf958af767ccf0a53261f6324b238cb33537a79bb3876c4df
-
Filesize
214KB
MD5297126ed819483a11740485cf34dec64
SHA167cbfa55799ee85643f32b029ceb8e111d4e09da
SHA256c1a6184f2ea71eca8a0bf513460fb1bbd94a10970219fe8eedf2dfdc7fceebef
SHA5124f1c6651ee1f77cf49cc601f175576b5534ba11909982f4507ba3c72da593c3c563c1010c4249cb69de7541f6c94316f275eb1c6d6f5fe1fd222dd43f226bcbf
-
Filesize
243KB
MD586c7427f49c27b8288e009619907561b
SHA1800d3dea6903e8f8f983df4ca7333e12068e1b72
SHA2564aee7ef717171ad0b6741e89c80199ae7ec579e088724305bee4c7c2af6c2f5c
SHA512a20b782bea7ba9f311b24094d399c0f334cda377cba47c239ebda5d4e53918af02c2cb781093f11fdb171b972733eab6dbfb85a324ad9f88fa4dabe4f6c5d80c
-
Filesize
214KB
MD58f81eed4acbb22784c43e2c003bd6570
SHA1b1b5c5effa7826c64e89275dda68e4682bfabe54
SHA2565956216858ce04bf4798a5819d6182952dcf7f77ecfeded2eb53d6375d3619d1
SHA5121366e8dda1cbbaea5bbe9f5e4ad6e190746d8b645fa4bb15b8399dbb7ddc32f27c46d22781f9b5b1e7fdb9682d09d5b98aba08e6ed66197ee5ea10cca13bc8be
-
Filesize
214KB
MD56fdb2e5e26fcb084e7a58ca38a7f634b
SHA100c768ce01e95c361748032883e296507d8152fd
SHA256880f5e6c383e7a5ad98510efd6d6006989c156601173b6b6d39a99e8c02a69cf
SHA512c772b6df02b4fed9630fe8595d63ffc0f5b4186075b99e2beb4abbcf96955af055a29e6ad14b9cb6d491cc1d0c32aec7903013efc17b3e1b20b0fa54924334bb
-
Filesize
215KB
MD50f1bb8e66de5bab1e13f9958a9d89fd1
SHA1e95082a3880fcc29136c564d3318ba62cb82d389
SHA25663d0e47a5e568b084b5f5e319cff175e664c60afe5dbc524b8334a147591894f
SHA512508b3f4470c5d6814272318f5af8def4d34e28a4ba4da8ab974b5f891efbef887b65d8aa90803dd8175ca1236dae74f823748f83304d03023d97b28765765c51
-
Filesize
214KB
MD5ecdf7eb8397ed25fed8d8778ed6dd428
SHA1f5a16333e6930546942c983ee2a6152da84b0e1a
SHA256ad30c0378d949d35824aa76ede26c5614de8dfc4c00e321b5a7ca3cf7eed2868
SHA5122b6cf8fe94ff7a08f7b63342cc8d9097bf2f51ff560e9635e1f9baf8039371ee4a4bc75338c4eea9b8d578052011ce5003da67a6bed9d09678845033f45c42f0