Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
689s -
max time network
690s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
meowmeow.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
meowmeow.jpg
Resource
win11-20241007-en
General
-
Target
meowmeow.jpg
-
Size
197KB
-
MD5
2fabe0eb16b1ad380865a5e96b994c9f
-
SHA1
708e7a377111ebb534b79105c3222e532e7a79dd
-
SHA256
bf1a01815482676f39bba64d4774eb96f9b861d83dfb1a9a2464e76b40c7e1d1
-
SHA512
c5f56c90c8b5f5a5d118092b19f2489e631042c6886bd3abd2f0729faf9bdc03f8aa35ca118f3b72aea3130de30f00ad7c447114e14f32835465d4820ef0f037
-
SSDEEP
6144:o7fyiYtyuTun51CvdYEjDGtoSOsGUoaJV/pNvO8O:o7hvmunmvdnCoSOsX/nm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133804181436734312" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 1656 chrome.exe 1656 chrome.exe 1656 chrome.exe 1656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 5064 3136 chrome.exe 85 PID 3136 wrote to memory of 5064 3136 chrome.exe 85 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2548 3136 chrome.exe 86 PID 3136 wrote to memory of 2432 3136 chrome.exe 87 PID 3136 wrote to memory of 2432 3136 chrome.exe 87 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88 PID 3136 wrote to memory of 348 3136 chrome.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\meowmeow.jpg1⤵PID:1096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb37b5cc40,0x7ffb37b5cc4c,0x7ffb37b5cc582⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2324 /prefetch:82⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4384,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4876,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4836,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5192,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4888,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5228 /prefetch:22⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=208,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4968,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5448,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4340,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5556,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5340,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5428,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3024,i,9931225769833767655,17547371316375438365,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD524a1cf7167056bf5b488c4f584281ecb
SHA14bb83eeac100e61c5a93dcc88bd513f93ecde62d
SHA25691356a062e937e8eb09604c6d25904a6648bd160b9da02a65a02447e23b39d4b
SHA512821580ddfce1659525865c081157d27c4a99b8d0be781b91435a79598274beacb79ad92faf87ea14e8d1ece7a709648a93c199a1ab14540f2c49b1cf39c1f2e4
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
720B
MD5c4c741052e2f40229dfd8652e837b002
SHA1ef35fe286bcd50d9b62fc7cce31f70e9ec203475
SHA2562daa1df1a8825d3b3dde77fec53f56091d9296bf20bea3c5df128ea8168bffa1
SHA512a4ff3571daeb20b8ecb4917ce7e437175396b4efa74d180859ac6d2272126f01108f80bbe54a47b9e26938213f578e43dbc8e9fb7a85070ef4960f399fe28403
-
Filesize
360B
MD53e479133d4aef6590a4efd33ca6dd9ff
SHA18e4e246ecfb66a3dc15cf360cf8a60589dfa8c63
SHA256e99d155e5f730dcc7fce59ed7fb8f59d6cedd1050b0151f54df7fcb67319a2dc
SHA51272cc05967deadf51ab50724334cd98879dcd8925e9ab67da32db1667d1ecb18176a541c3eb8a3bbbbc8401cefd25cdce8f8d3c30106ce45c60f57f70ea9032dc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
3KB
MD57146a9493712f2c6c8c5ca5c189a7d92
SHA131132a173c803494cf27d5ab409536a856e524f3
SHA256555411f37c819462a38bbe67ca026c58aaa41e55532b513139c32b2614562092
SHA5128dbe853a56c7764362691cc952e92d2b267544985c7396c19f41c0ac4cfa61fa3ef5af9803e4e8f794c6a79f395642456773e11351a546ccc6bcd4491a3daf54
-
Filesize
4KB
MD582d358044a455992cc733725fbf0d3e4
SHA1127d4e348044297b4a807a72b3049dbc36e69b32
SHA2563a070b7dd2404fb6fb07815a4cedc28d91cc543584f542d1a68d5075ab8df7f4
SHA5120ca15f75932d05a9712d258dbf3d609eabbc7482a503b3e55ebcdf6aa36bbb93d91bedcc77d943560ffda15302b5e6c788e4df0e811423b0ab4cdb2d3a63cc21
-
Filesize
3KB
MD56153d73e83948df0beb6c92da6dd5525
SHA12c5ce5f12d8b3487ba167185f3ea692d75ff46d6
SHA2569e685ce2cbefab3d3981013ebf7e2c6984d9312d463f37a275449396ef891528
SHA512f56a226beb44c0d3dd83d9606bbebb40a3ea326431e358b24dec9d6bf4b16b88b4c07e854f44a2eab95d02cdc2fffaeb4f7378383d552c70b5cb0d25b7ff59c6
-
Filesize
5KB
MD54620a5b33ccb3eb0b82589b7555681c9
SHA1a87c5eb34fbfabcd23f74026d979664ed0f12911
SHA2564198093e0aae4c7696ba4115d741ab961927e17a881cf639baa83b923fafc400
SHA5125e25c61ecc0d69d2b3123d6ab7e086aefe5f1fcb3f5d5c0cd84ab7c5a8bd98da5e29f0299f2a8eace86ac2931ede5cb91af47e2e0e217034aef962e650e17612
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD58697757312810d014b72c7c8dbb082bb
SHA195daa1ad28c6fa7bfb168382aaffb1d380fd79ba
SHA25658409251165a52edf1bc9e7f50447a08170e7c07aaa149553b4f56312fae4cde
SHA512cdb02f0ef99013a0979d5766f4ce92ac6fa4863dbcbe80a0ddd42a8d7f6f854032d8c5a94c61460b8a34cbad83a75ef8a9c2b68297216d5ef45345c53b5a31a1
-
Filesize
1KB
MD53ff6a18a3243dde52d771d979d36f1ef
SHA1458e593c31aa07d98dde86f5cba340d5874d334d
SHA2567b0b4056ec78c0c55242b58b436db8c7fe62cb406e156e75a9efa6dcc83412c1
SHA5124b6a4f9ff535c73737bbab61aee690277eb5ed1ff3ee2404db621994a7497b1b6cc47dc7a2b3038061ada87f3727f9947ff5bacb571f7795f6952df6105074f9
-
Filesize
859B
MD572732623da2ecce6849f1c47107bf722
SHA11eb3318a30c1c569399308e02073f6ab5bb9ab30
SHA25652810caf31d561e8a4a3262eec1a9b93d20f7d83d498ee3d2a311f13584e1f3a
SHA512a395e6383edd7c010e88845d015c9843ed3a2d483029f34da530a896d7ad3dbaef47349e13f1329fef03323eef6092661d817697d49342bab26165c7481f2756
-
Filesize
356B
MD5d7a3e13845ea7ba997e2a552aa9a97ff
SHA1d3e5cc0ec38856f575855662bbbdf02400a73407
SHA25697b1a3b0733a3ebc3f4b0cb34eab357573ff1749a48cb7f18b0a3754c44c89bd
SHA512bee3b470d957c1bf54709a592adab95be4e5dadef8445ed1592c20d19785ace0042f41151d6851e2ad56ad6e74bdd1adce84c0b6676c9ed20eab8908d8051890
-
Filesize
10KB
MD55dfa91fde933856981daa4e72338717d
SHA1d7705dbdaa1b183965632f777a98d638f109de80
SHA256c6066c20774baaa22dd0e662efc23b43637136510d8986edf1d117fca6bde2b1
SHA512704818eb3cf78c540c0825bf43b6d606a9c122a2f465f7ac998b80756e006dc27366a376793f93adad3d3d427a324bd9b86f0da402bce439d5ad7dbf942bf008
-
Filesize
10KB
MD59bae0d844502f7dc34064cc03f623ae2
SHA1c299c5b3f544f0ef6589e51096d0834834421739
SHA256dfbfe26f9071f397cdea8c1970efb2845c9ff2b520923b6a5ad1073c2f190ae5
SHA512896fbfe95224300a7acd0ab4fd280de94cbbc431b11c1af4ef0124b0a119282ec1848ca541851b6eff67e3f127c2af1b2b3f4fa0033b92177a400d738a6127d4
-
Filesize
9KB
MD52e80d6e1e6398e442367057219999a08
SHA1c21e4ba110548c64684f63daa1a8423d4dea1902
SHA256713adbc6fb9f502694854ca9fd359d321592b7c89749cae842a3d9dc738b192a
SHA51241de210107e8bba1d05a13035ac79067da353dd07e52b55ac55070f5b6a427f02b644e9fbd3b76695f118efa30b4f0b58a8e117f5c2f8b97abf1960ff54dbb3c
-
Filesize
10KB
MD57e91b138a5ce56f343cfbf1d51881e6b
SHA1b5d88154cb007f6cb9b932b76f2185690dc634f3
SHA256b8dfeda08926569c5a5450b7c02a9f04c04475cb997b7c7de7d0ee3f9121e935
SHA512107ae99938d2c4bdf31fb2ef88e5257000dcf2b2315972a6192263ca9c07e4c79bb29d4ba5a7175e5ad7553dde63467088c1c6e295cee9f7a0e954c4dd1dba92
-
Filesize
13KB
MD59e0e8d1bac3c83c60eab37b4928e5e97
SHA114d331f8848d8922f135607fdec0d6f39aa45e1d
SHA256930470aef10528ab694d91b866929872d9d94585373e5920d0526e274a18365a
SHA512970999019937be269fb0f1bdc8d0d925c1cc51411668e7def2d83b843b5c8c0aed31a29c4f169127285a712f861a62e0d3843326ce087d12f46e70c527c463c2
-
Filesize
9KB
MD5a5a19d582860b24adef1b44f2079ae76
SHA19d5104646a75420fa674ce74cef509445896bf40
SHA256e652e1f5c201e6add3ff3f2159ff0e72a7395acd83add960064e3e0be7b6befb
SHA5122630c64f094d984979983052fb88342e4d393e1170b4b2bf295da1a0fc444542716291f3581b5f74155e19e46196a86018185b2c12dd4427d8aac6a277a6664f
-
Filesize
9KB
MD540c9f63567c0a44bbf093290dc25842a
SHA1ac3ff598a26468426694da5d87bea36ae3a426c7
SHA25614a9c09a0e0369a6279648912312fe9121ff700d20399eec6d9996664f7dc9aa
SHA512e00fcaf2dcd050ef863b713fcd1d6e37e0cb570a20824e0ec33703a7b54f9eaf45db1b2dba0b5d753dfff2b197f8eef707b023936d4c35db1e474804feaa3c61
-
Filesize
9KB
MD5d76eb1671bc3150c6df11c7ea3a49f22
SHA1710a92e4e705c18ea9337eda1ad69301d9446342
SHA256db65c1eb6695e29aaa74e613475c90b6b6a6197f88b3e63f1b060748ad54c44b
SHA5122651ac24a195d1e5940bdc132b46a8266f1be20ad4f61118ea60528c56ef89ee641ed0b7db6388aa0741918ccd865c856df6995d459320e90aae218389aaf279
-
Filesize
10KB
MD517716da1f89af470b8c08c9fc4eb65d8
SHA138ef9b47b9d0ce4f740fc754fec14db2053d0c04
SHA256a332f3c3d7f50fb2243df169134480fd9783f3781dc166ae58116ef650cc021f
SHA512cd2666b2a52204f311b36b6e02b0d781495062d7dfbc8a57c26a09d3f8fb6e9c374bfb97498627bbfbe31c70c4ea719e14642795efceb2cbca76b79dca48c195
-
Filesize
10KB
MD54f34f3678631c959ee1b9885a44519c4
SHA1e8767943a1e26ad28e9726d23c7ce9a91bb78461
SHA2566b68f54befdc5a9078e6590a375bd7323dea7003e540f111cd7b09a73a4b84a8
SHA512ce71a7b08e07ff36fe23ef17e5e53775b1d88c3944e3d2507cf008dbfaaa701f56766f3e9af87a44558461f50058f1fe7885df4c9d47deac9827bf1be5e66928
-
Filesize
10KB
MD552df2aa827120e0f23bd59aa9dc7e336
SHA1636effab6e8a8a36dc209139206cb5c3571f6c6f
SHA25608290a0dff89024fb3441385f29bd0cf495d70447c4b46e3667e570f846e2bc1
SHA512df9125ebb8c1236269b2fbab40d7fe28f8bb5f8728c1104df66bf62fe55a3467953b38f174139811d0ebe9d7e8e53ab9dc0cd9dc8f6fb1ec06df3e30d216b715
-
Filesize
9KB
MD5e8346a3b2ea4ab09b6fe05cfc52ecc0d
SHA1effaf3a1e705aeabc3d6c988f422e4e41d12d74d
SHA25659b88636a94dd3f8e8a548efadb695766cf14bec259a64236201faab408b65c8
SHA512a9396848fda24e63fa114c2fca4c7b5a54208d355e462c8647e732ad7dc72f46483b5b5876ae90263e9f6b9fd2c5a4ba770e747e1f91a5cee09c15c46c313122
-
Filesize
10KB
MD5d0fa5fe3a97dd690144100e83edbc989
SHA11be2af3ac7516c09ad2fd3d3c459866873ab02a0
SHA2563a094dc62e59da6cd842792e4fbc5438c829594ac96c33d866b1d04211b70ff6
SHA5125c3b22973eee0b2cb10b6b6bea06b5d274204c34e44c5eceb58e606686f36aae05d0185c839423575c55db240aca221996602b1f305478e134394afe6c8972ce
-
Filesize
10KB
MD54d2c2220aeca8931cfb248d9f99183d7
SHA105a9ab1b6e724f3ae21200fa6195e172f788a55a
SHA256e1e5ae17041f0eba2d4e01170b9509714ce1fefeeba729cd7b4771647e991fbb
SHA51260dad218142279e615d1ac6198cb435bc9f1accc09d80547158445db2a52e66630cd9cd07681f5c5585eb1a2684292c85d8778e9b2b79668f9f1c858a7a25107
-
Filesize
15KB
MD5dd8e1197686440d95bfb80f32b72e919
SHA1b1570bd5ff6410bdb44003ade62bf77bb6d8617b
SHA25636b75334d33d3f1821181fea31d7a5cb324468e7b4d399c0b2fe37890feaba81
SHA512ddae499010570e55d3a2ab68ee6d543010e9d974820a1f664998275f6095df57ff3e583bc83b4411e602e6a0f328a13d40d8d5a08b2b2e6717a9eb6c4ed7d117
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53873f0c99a7f5f148ca7454f29623df1
SHA1c705ac55b842212320e9a342d63ddaa109a04134
SHA25677412c623190be7e6a8e3f11264f0344c72f1ece0206e6fc3d226f869d3655bc
SHA512376534c3acbb5fa5f922dae551c75389f5418d5e207bab50f0226929b52138a9d5db626cdd9013cb4b0842ed4fdd34fc192db77b8de3061cd3994f76fc900e3f
-
Filesize
231KB
MD54166b95bd3bc812902fe4189c52ff7c8
SHA1fdeb0fd0e5387bec552d4df65628d1bf67190244
SHA256d4a96abc4713c604524f36248488a5f8574ba32447c62219c56f09fab318864f
SHA51239527f43d35fee98a331ad77454da7934533b994576e89f9fc36f014e782d3a6115393ef44bd69b041c74184d04c9ded6cb0470615f171e14ff77a0d8196019f
-
Filesize
231KB
MD5a3ce1e11b4e1930e72871e2718b681e8
SHA1008c752bc1c95530f3c11094f68f93f364068027
SHA2567be2f01a0721115e0dfa0da10dcfba3d9637997ac45254c2b19a558e85775639
SHA5125a20f8a29ebfd4adcc3225812dc8db6605cd1c8594c13694b57bd1bdda2894503b021378e4e2ce54ae704a4a4a03aa81a581e00e98a39852f69234efada83255
-
Filesize
231KB
MD5b7d979ce8d387a836d10f3813e75f9c9
SHA10c852500bcd1896ad99614b6e8daf95dbe8d19d7
SHA25623d17b6a7f3da3ffafdcd8a33bc874b81513af01ccdb6a4b16beacefe36ea0c6
SHA512e9fa4c05ffbb3faaf6629dac97f276be3715e1d1736da227a5bf8a1ad3c8da8fdd6cdfd9d92fac224d1a945ad1443edd61102da835f7e43df0385517b32352eb
-
Filesize
231KB
MD5ae135c50ba7b6dc31b7b1476c2a97242
SHA1e50f13a984c1b8869b2f03ef90ca08c148763023
SHA256a0c55c3ba35469c36ce11cddd747601f3e4200abb705f3775dd26ce96defd359
SHA5121ecbba90b34995c3f1f2208cce27d2b1bb8fe62efa8729ce9873658403f4394bf4f9b1ef6f396dfdaa45dbead4d79d7eaee59b941cf4d583514e980d0e443810
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727