Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
6data/pytho...t__.py
windows11-21h2-x64
6data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...nal.py
windows11-21h2-x64
3data/pytho...ing.py
windows11-21h2-x64
3data/pytho...t__.py
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...t__.py
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...hms.py
windows11-21h2-x64
3data/pytho...t__.py
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...ric.py
windows11-21h2-x64
3data/pytho...thm.py
windows11-21h2-x64
3data/pytho...ion.py
windows11-21h2-x64
3data/pytho...t__.py
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3data/pytho...12.pyc
windows11-21h2-x64
3Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/09/2024, 12:58
Behavioral task
behavioral1
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/__init__.py
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/__init__.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/_conditional.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/binding.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/_conditional.py
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/binding.py
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/decrepit/__init__.py
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/decrepit/__pycache__/__init__.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/decrepit/ciphers/__init__.py
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/decrepit/ciphers/__pycache__/__init__.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/decrepit/ciphers/__pycache__/algorithms.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/decrepit/ciphers/algorithms.py
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__init__.py
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/__init__.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/_asymmetric.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/_cipheralgorithm.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/_serialization.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/cmac.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/constant_time.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/hashes.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/hmac.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/keywrap.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/padding.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/poly1305.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/_asymmetric.py
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/_cipheralgorithm.py
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/_serialization.py
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/asymmetric/__init__.py
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/__init__.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/dh.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/dsa.cpython-312.pyc
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ec.cpython-312.pyc
Resource
win11-20240802-en
General
-
Target
data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/bindings/openssl/__init__.py
-
Size
183B
-
MD5
bb9d9bb06f5dfceb27f0fcdd3a7ccecf
-
SHA1
d3a9de5467e13f7211cb4e50316cde8b1dfdd7be
-
SHA256
276800c00bc954b40a35f1450aa9ef28e020c6abe40a7a5c79a11895794e54d7
-
SHA512
03fbc71b4627319b458936c7b3962d02c55f061a03984c5c3303426d985acd598b314f74a7f57138427897dd307010175eb4fc7ea8a1c01efd20610ea78d5cb8
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 16 camo.githubusercontent.com 55 camo.githubusercontent.com 56 camo.githubusercontent.com 57 camo.githubusercontent.com 58 camo.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133719157208431733" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe Token: SeShutdownPrivilege 1728 chrome.exe Token: SeCreatePagefilePrivilege 1728 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe 1728 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4776 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2936 1728 chrome.exe 83 PID 1728 wrote to memory of 2936 1728 chrome.exe 83 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2248 1728 chrome.exe 84 PID 1728 wrote to memory of 2376 1728 chrome.exe 85 PID 1728 wrote to memory of 2376 1728 chrome.exe 85 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86 PID 1728 wrote to memory of 3016 1728 chrome.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\data\python-3.12.5-embed-amd64\Lib\site-packages\cryptography\hazmat\bindings\openssl\__init__.py1⤵
- Modifies registry class
PID:3960
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff91678cc40,0x7ff91678cc4c,0x7ff91678cc582⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1844 /prefetch:22⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2172 /prefetch:82⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3576,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4620,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4444 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4624,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4708,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4396,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3480 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3424,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3312 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3452,i,2781670786260766785,13084217744727212295,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD50d1eb910f0d377e6172d89a87b5a9d63
SHA105b691337a8d85686cd47d13e7d73fc46dfb23b0
SHA256845b8980c743de2636e666e88737a8dd4eb39159a892dc9d1273205b271a7e81
SHA512f3c322c536f207932b982154baf7e0c5a3a40bef6cebec8e7074a2279070d4d53e1e3918033dd7370a1352cf62dfff0c0497c063d035865b4cee4401af99024c
-
Filesize
456B
MD5b8c3f0a3904131126b50120f241f4cd4
SHA1105c2c8374b5f7ee7d91997cb913cb63e0e5d7a5
SHA25679b1217880f49cb08d38d0a8b733895e14cc51c4054b5ac1bd81c0b053a1228d
SHA512a96df6ecb9e5da4981314dc93f45313959d60c8a75adcdc5f7ec3df49aa206f3cdc711cbc94174cb6451044527828b6c8c2573d254f1a0d66fdae389fdffafa3
-
Filesize
120B
MD5a2e8802ffd17b8e7936a255c93c49da7
SHA13001f4333b58b0fef3b831da1975a261448fd884
SHA25651e18c6f32a83faef9b98ef698c6e6486e0c28b21b99562789915c594777e625
SHA512644d388917cbc2592ac901c13e7ce9bf270c4e69d402ed69e065290399ed0495c8e56cbfda3350ebc5952dc0095ee57d4dfc5076ae64e3dfc5273c660a49cf1d
-
Filesize
144B
MD5c0af85b72e0e6e921ad2bb504acb59e1
SHA185ebcf788d115900c5de542196fa2034e38b2b15
SHA2563d3efa4ee2aaa933125954ccabf1ad2e0e88a0fc912932cd0b07e99aa4e731b1
SHA512d9043e0ddef11d505a037a4e4fff1f1f0f641e7b45164c8f73c1192ca27e5702ee7ed8479e95039c56bb42fac27687e41b5805e090eae6a7580d2d6509647d2f
-
Filesize
3KB
MD5a3bf031ce82c0cd2a7c41fbc7c90fef7
SHA13ed62a67e97ff967977e7fe26427c40af5311a9f
SHA2561d2014f17b9e0093cecd9daf5167ea57e1c5b748a495f4287f0888080f243ba5
SHA51250d670b3683aa8ab2922917a7dcba5681cbf30ea729f7ca9a7f99c45c6538bc611365ad466e0c06c3229dfe0980c9b7c668c723d1ad5ea13c254a82f55595afa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c856253c78c64769059c3ee88308c09b
SHA14f398b08d6eb90a4cccd57bcf1beb721db5f9530
SHA25662e087620cb82bd067c410c161b9677a386516cda17d8ae94dd46fd26ddb6df0
SHA5125b961b1b8cde10726cddd7ab90af60561b2fa93728cb1983b54bdee1b5405382201eed99dac3b62bdb28713cecd0aa7c925846a5a82de49677bb696b2223d163
-
Filesize
356B
MD56172c42f65ad2e903efb1bfc144d030b
SHA1a3b57468f9957ba5c905574a5d10f1fde28d2be8
SHA256f6ac31b24ccea93b8aaa5ee281592e78d512247c4879bf865b4f182222f8f248
SHA5120e6688f31c81e94c83406ad22fcd89755ed6303b70acb6f840cf98e1de05e01ccb665167ccc12da9763566ce28215357aac624a62e2f2d842946b32d876748e7
-
Filesize
356B
MD57a9813efdb298d534bf79a4ef3e319f8
SHA14f6dc3d5c55fd36b09cf2637b8c7e763a7ad0a49
SHA256dbe4574d010bfc7dd3b9eb32e923e827393d19cad9a6a327649a474a9a783487
SHA512bbabe14b5387a4ca692b1dbc08662e3b47b2c702697a5d57285ac33ba5a7d91d2d949436ad4702933a4d097aaa94e4c6004c2e891f78ffd7d5609fb109edaa14
-
Filesize
9KB
MD5c37e4fc227f8cd286ab49d4b26bef51f
SHA1c8178411d4e0a635f65371b7073904645af05918
SHA2569bb77ba38fe5c0abfbf5e0df17b51a12abb446f51233b0e60e6024f9057e5c36
SHA51211ac1d3d28fc6528dd4a0f799d92b92189fdea1218f5c43d77ddf2ba60c76d2d60c7805603386cffebdcd1e015c8b2bf10a0a6afdd5aa2ec671ff0df50e77088
-
Filesize
10KB
MD57be666bce9dfae249caca30f92e95d0a
SHA1c785b0c1d2edabab6ac93886fb9abb7690eb6fca
SHA2566dd384802af5e221fe565989d66027f13015d84f9690024808bf22cfda20464d
SHA512bdbb8a2aaee467e912bce483538c157b4809a42fc2f14f4d78faaec4baf7732c846654d6ae8585b1101236dd4400fbf0fa85f566952ea2caa2c01c32ce318391
-
Filesize
9KB
MD5ff7f1366886675461b304cd2a5e837ad
SHA165ce38684f8f88881b23abbf943349aeb578da76
SHA2563a793533095b907e05d0aa0694395a5d477feb04fb2cde1283e2ff176bb7e7d1
SHA512690c4bfa5a0f4a37dd3653f62c0e064496646ac9d6ab67d83bfae284ac412c7b9f7b35d14631fac28a3a5e154b6fcdf20070b753b9b448908bcb5dcd349839c1
-
Filesize
9KB
MD5bb1839a6e0c77f7561a1deb71301c0a0
SHA16e1a2a6880fe434dd9552b7ab525360c2c5989d4
SHA2564c2539341ff261b6c7ec6126cf66fff2e37d041a2c9abc1e599e72003a58e65c
SHA512fd9e9cbc69804e483b7c60019a7d622f02ec2b87e4519a8dc6050925a6d1b89050d01e65f9324a02718cd4ab7a4d88c68504ccdd615fb41d1be94cbf9855bc5b
-
Filesize
9KB
MD5c1827c9953917fee948ed1a943eeae3f
SHA122c1782167917b8709f9c11a9daf55fdca1e6f14
SHA256d4f90e7dfbb0d35469f52aa36b3576eee3be8d8722ef11bdcd1e541712f3ced2
SHA512134145218e58f4b0c90ad779fe84571e28a4eef0f21a8c0b3045a950524e4205e49af5db3d0f9bd8db19ab75787189ce75507c6940cc2d5d3197e66f78ea5069
-
Filesize
10KB
MD55290116331a16da08ae373ced77c4155
SHA1aa2d8f8fff707334b60b4c91782dbcb244b9a65a
SHA256c6bc4bcfd8d3a501885ffb1c1ae5818b498b3e5e960170ae019e90a0a772ea7f
SHA5121a888d905a0ca98c2edb75383fec5df57ab11843085fed801329e9dcdfc0a5bdfb51cc7d228638dec918c5b417ba62c8788169d0e1ccdf92fa4cc63d433d60a9
-
Filesize
15KB
MD559b816c4af8739665e5542dea508abce
SHA1bcd21b38967a138f4d46a4542ce7a3190c5b5818
SHA2565aa9953fee7621d8829ff45ed7f6364faeb367b5b27170c8c7e61a89fa756efe
SHA512fdc1dc035116b0fa656af1f748ca58a017f8e9c8ef18ae83707e5dbd5c59728c63258282a50c4a5b87212949d75e16fde1022d5b057b41494b8ce034ea28b9d4
-
Filesize
214KB
MD56cf9fac433b40515f601bd4479220a44
SHA1f2ad2417fcb40c17c8589cb40bd2027484c46b53
SHA256c7b1d4d4b436ddb4614165e02be5db5cd56dfd5fa2993a7ef9e6294156786eb2
SHA51222e0429d315ca1260fbdaf9fa3a524d83c9a7e5df57825f73981d4fe71200bd0a26da813bb13cc56d1b3eb48e4ad34936d780fadff8dbdf10ab5bb7ed2b252ec
-
Filesize
101KB
MD54a27c965615764c66f8e412bdfb6d86d
SHA115ac8aee2d40899ac903df64d82214f150a76890
SHA2568d71b6f2a9a117d685c486a8138060283d9176eebe9959cdd97af6547343c17e
SHA51246bb355f0e1fe87c5c12df978a3ae09ed194d259f16a189ea8d510ca2e212ef90ba8f1d26df66c30bdd55bab0dfac9c8b9f78a07dfe61aed611a9384185b4ad8
-
Filesize
214KB
MD5931e44d8f77113bdf438843dedecb7e8
SHA16b5ed51abd4f3657c72c38c0cc9330a00f75fa03
SHA2565fe6b35ebd34a1ee3db102dd18477f46f9474b0fc50306ec4bfa3b537ccf6d6a
SHA512dbd3231bbaeaf9ca3269e3a0749bba1de4ccbe489e933faf3199131791b4eca73cbd5b0fc31176113eb4e6630e2a6e07363aaf7ed44c363733227fc8d891134d
-
Filesize
263KB
MD5acbb741c427f433bb8b70c6352f2122a
SHA1b2aa6d57f65899312e0a052f533ec47e9e2dda6e
SHA25695e27041221a10111f3df8776d9d613ad91fea763d475fb50c51a5cbd3ad6e79
SHA512a2bae5557dbd75e3a84ab1bec5f91d4c9a2dc03f082a4129676865c000a2495f1bf2887adbbf10e9b90db6623b57d7ae06d5053d498a8adcd9670932d7273a12
-
Filesize
214KB
MD5013dff9bd4e48a6de48ac5e03f4599c1
SHA1ae0bb7b65056bea792c755d83e3acb06321b618f
SHA2566bc6495d00cbac2a7c25b899e40dabdb2572fba5258a40059f5b7fbe7589b1c2
SHA5125ebc2c94e82a85fbf84f52b10255f6fd63fd3ba7ed3866a958afc7295db77ed0c199e1a1b58da4f9dcf32d16970df1fc1084c40482db102ad1ae9fcb1f9d20a3