Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
27/02/2025, 18:42
250227-xcbx8awlw4 1011/10/2024, 20:37
241011-zd4ezaxcpl 1011/10/2024, 20:23
241011-y6a4fssbmc 1007/10/2024, 11:02
241007-m5c1wavhlf 10Analysis
-
max time kernel
79s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 18:42
Behavioral task
behavioral1
Sample
2024-10-07_1f60c8eb7d075318852a75c2f4b70c0a_revil_sodinokibi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-07_1f60c8eb7d075318852a75c2f4b70c0a_revil_sodinokibi.exe
Resource
win10v2004-20250217-en
General
-
Target
2024-10-07_1f60c8eb7d075318852a75c2f4b70c0a_revil_sodinokibi.exe
-
Size
130KB
-
MD5
1f60c8eb7d075318852a75c2f4b70c0a
-
SHA1
7ad5963fd67f91e186b8eb55ac5735069bc2d6a6
-
SHA256
6c0d4827848bf38f427cac60023e337fe39e2271b43f890275c4ccd6b66278d8
-
SHA512
8e29a1a6f361090540545d8322a62b4ebcfb0bbaa2bc474a30c597ba6b08a90becc0450a1d67f350943a0b5c989b004bc845592ac5f3c44f22135d17d46cdb3a
-
SSDEEP
3072:rIHI9eo42XLbi4eTMlwDCnut9N742J936+j:aIwv0bnWJtH7nJ56S
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 116 312 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-07_1f60c8eb7d075318852a75c2f4b70c0a_revil_sodinokibi.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133851553525119428" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2593460650-190333679-3676257533-1000\{EDFDB9CC-ED4D-4860-B15A-1833D7644903} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: 33 4180 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4180 AUDIODG.EXE Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 2524 3200 chrome.exe 106 PID 3200 wrote to memory of 2524 3200 chrome.exe 106 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 4752 3200 chrome.exe 107 PID 3200 wrote to memory of 3504 3200 chrome.exe 108 PID 3200 wrote to memory of 3504 3200 chrome.exe 108 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109 PID 3200 wrote to memory of 720 3200 chrome.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-07_1f60c8eb7d075318852a75c2f4b70c0a_revil_sodinokibi.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-07_1f60c8eb7d075318852a75c2f4b70c0a_revil_sodinokibi.exe"1⤵
- System Location Discovery: System Language Discovery
PID:312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 2242⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 312 -ip 3121⤵PID:4176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff97883cc40,0x7ff97883cc4c,0x7ff97883cc582⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2212,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2248 /prefetch:32⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3336,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4592,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3800 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4768,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4968,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4512,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3844 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5200,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5064,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5288,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5272 /prefetch:22⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4472,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4424 /prefetch:12⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3400,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3500,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3508 /prefetch:82⤵PID:5392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5588,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Modifies registry class
PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5660,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5840,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5664,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6140,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=4692,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5060,i,12515145686064680374,12429183668034494472,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:820
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD544b58329795ec7166e197d2943ca4021
SHA18c5b1460dcb0e384d56294368a72a49207c85931
SHA256af03c425d45b39ae270dd8b1f1aaf67e1fb2a5ac5bbcc06a0b611655c7ff9b76
SHA512f4359f3e0acd2b67ed9745b3336ce1735183dcc376975920a70c881e7880418fc9c55527f74d0ecd5fe04dc295cf25971f0fb69696506468932141e0be4a01e0
-
Filesize
71KB
MD540e127d26cfb391501c5742a9b0bd4e1
SHA1804fd30edea2f8fcc750462b66e8c0b892b41f58
SHA2562b0cdccbc113c0aaffb4a76a446619f64448f455aef1e8918ad8970fbb9f27ae
SHA5123cc6f73804e8278ef31c971f329d2d078f6cf46a7b2900fcac5d23a8696d64ff1ea4ad4259174a25bf33bab378289749a5fa4f129e7acff8d91422460d793670
-
Filesize
114KB
MD53ccb2ecd8454f0a6fe1dfa433bd74370
SHA1b13b6ca388655a4b7d8891d25c1e59d0dec12176
SHA2566a302eb92092d2f476bd0d5790ff84f9083343d371bb80ec370cff29c5ea5241
SHA5124a4dc0afffe80e339d74ea645eb92c8e68465ebdeaf93d776b90e916d3598d0d837e6cabbc4dcbf3411078698b61dc1c79d15f76f81880e4bd30a8691c56ce40
-
Filesize
1KB
MD580d89729bf10ae8b48f7377dc4223ca1
SHA19e37b1a32eac228217b4924131b60122b01d1934
SHA256d7db5c18d791f046ef2e34d2139b3f37de34be4c57e87ac96a19b15112d93a98
SHA51202cf8e99d530ec02192c25de14f1879fe4cafe550fa8959df7b0db0b224719db75ef9c3da981c2f60cf40b3c1b58c7f952d023468c196fa3dd8e344d6aebfbf6
-
Filesize
264KB
MD5ae22a095577cbfc6bd0cb4554bd8a2db
SHA134c62526cbb4271a56550b1c638fe49851d45082
SHA256b029bd8ced37271350188359bacbe7089c49bd635fc42f2ffc1e6f7b5dc544d6
SHA512fb6a556127b3a7c4f0216b7e4b1500bdac984378ed3327b61891a2a3a6328257d86b6f15bdfa7db0830e40fd8ab5eb78b435dab5eb3c64a392f729a32b5c05ed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5322256b5ddd9a260ea6b099cb3427e18
SHA1f697735d89c1057780f57c68177d3d603db564e7
SHA256bc65f770b2397fb15dddbc7a7db74656ba881d5bb5cdf12b220baa5dd32d5d8a
SHA512ee828f78b8696e3cb18f6c44e8f927524102b5dcbbc5e4b6f25fe82ee0cf1cf234ca1826e4846e368eeb005106f817e884f390c329b4f9a7282cec44158669d6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD554ff5bf25b307b05ace65372abe1b9c8
SHA1258b7e6f636e195d9a1b96caef045a6f785aadb1
SHA256c7f258d77c9dcb07ae10ad189924f8bc34fd255cf21bb8e3f00cc4c15fe5e8ab
SHA512a1e68e6dcd3ea1149ed858cfbfdb560f616620545c9f5246e8da5e74b8f79ca54aa0bf4478b8183c73fb1fe7d7bfb6ad6bc04985ca8870030665802877ee36b8
-
Filesize
1KB
MD5924709591d5e34178b76894d5d2df4a4
SHA19e9a5bd3ac69f876a9cf6eeb3e97eac837960079
SHA256bc06338a849aff06670bc4c2ad7d35b4149a8ecc2c27192870327b6515dfe35b
SHA512aa2f8f3d9b1c3d710dda3e3f1664b93bce4f820cf79ee735600b45490d59d1e6301caeb8da2c3d394dd4c43db075d178789279fdaa58b38b96d2279ed2f7a93f
-
Filesize
356B
MD563b168a5fec7aa7b2869c42115fc12f3
SHA118888ad1f002720d356583aa2b3d7b35174500b0
SHA256d30e595b181ce948d64f3ae2615ce3fca86292c96312bd42e2ea4663cba17799
SHA512ee5d400781d30cc4d9fd98a43fe3f0b892c928a6e965cf8dd83870f5f66fa4d6925f9f3876824df242a1bee5c7e6ef2f26e5f7159972d76cdb6072e334a58401
-
Filesize
859B
MD5252010279544994c89fb65afcdb3b00d
SHA10c2b7db2e916927de42e05b0b872c1a979f13cec
SHA2569689c2a6ba6baae19f76658fd584d1c716743c588813109da28e679c3e48db90
SHA5129656fd1cf274b754ea939d87047789a4bd06dff8f79ab1efe191629181aebd77a06ff403de07481008e84ae5df3461ed22d783de39bded25789bb20b78c1c28b
-
Filesize
10KB
MD5bdfda291898e9b5fc1c8e7b0eab9db82
SHA1df1fd4fdd12dcb5ffffb6034dae3811767cc8e9f
SHA2562ffb5a9f8a0563a282fdccdad982da5d2047158d1f0a26a5ac04eee85bd895d1
SHA51202c5cd0fa778abf64de6192177c1f470f59acefd036c143acbe155faf8669199e1f3a8ff600b37faf319a509574ee4dfcbf6b874e3516ff8ef9bf4a2d4f811b5
-
Filesize
11KB
MD53f9b12d98b0e54f2a751ca4137fa61ae
SHA10f38aa14583feb527a83754cf6a13d3ea68eab48
SHA2566a5fded36421ba2e257e6e698df3fdbc5113ee5df9ef31978871da78dc74bb9a
SHA512f809c36dbbea6480caf7dac789f9a6e302c994f530c07429e0998b0143341f7c86da27c78f98803f429bc8b39cc2764ce5b945a944edb0f92c3c0d3876367c00
-
Filesize
9KB
MD5a40fcec2a0d13f35edca91c460f48a7b
SHA11222a343362726ce5b024032fab85b9ecf0ceb6f
SHA256113d906f8d7a32431b20773dcad25875cd3222e74dda6eb62d94e12dfb56c635
SHA512a03404a0fbfc574feb100f7032200c9fe9bc5761cb8d5ba3f19f0db53130c5000eed5497330d8d547ba314c00d5a946476f3f36369c6cced5fd348785614881a
-
Filesize
10KB
MD5cd58fec95b01e7903075ae112d8a60c1
SHA1676771fa515f03ba5ed3621d3a72231c061a4fda
SHA2564ce22305671285d5ce4e86b2f9422415029b07985ee35f4d8729dbaaebdcf2aa
SHA5127fb22bd2acd5153edc2899e3bc1d94f14bf3bfc8bd69b9bb19f080d336bbc89b760f44f0a0c140ab1cc8554a58a4f30990d03d642e2d7bc92b0e3717d938fe6d
-
Filesize
15KB
MD53ad0af11d35e34c808d8846a0d817d99
SHA106a49988da4bf38fb68ee8b15b2901313bfa2fa2
SHA256d7010a492d09238409a1cf51db49e7165b902fabcb47523b98c97d968687ebe2
SHA512c24916b27bd8b3bc114b98555c51448a51eb201c3832fe4ed1cef729ad8063f65ebbf094f5bbf2e81bdd29c03a2c761fde5f4b1ed88d71d37cfc8f576272199f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\42d7ae6b-9949-49ee-bbe6-3e9c21541e84\index-dir\the-real-index
Filesize840B
MD5bf5b71a01b356a67ad40513c1131f47f
SHA1ee65b031a513ce35b1fc43fe6d85c21226e5403d
SHA256401cc3eb8c7f77bc6eb0d21c87f7bb047dc1e0c1d299bee267e1155caa1351b8
SHA5127036ef60d6933e49923cd9d2904ace392d7a655ad572d734c39c69bfe2a9c1989de629ebd220c13b7dca7ddc73770cf358f1f4c168542aeff6d05f60589825ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\42d7ae6b-9949-49ee-bbe6-3e9c21541e84\index-dir\the-real-index~RFe58b968.TMP
Filesize48B
MD5b1f2de154138fa50af834bf44b777356
SHA1e5f30c331d14babde27afe2cb86e27815b9757fe
SHA256b3f4f482ed132049ae883c074ca47d1fe19392f0829bd763496fcc2c2c0a6c18
SHA5129a138a456369fe0ffb5411e1f2223f8426295dba28255b85af5894468a2dc05e086a2a1f278328eb24a439414898cc14aa968aae266c2fd7b378ab38151cd8e3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD5d3a7bd15d81fa43f351d4bc2a45cd2e2
SHA1e12a126a4f574575fcf23eeab11a949a36c23dd3
SHA2562ee0e4224bed064858b6280a405d36b0ce924519c1d6f3daf5296f6817c366cc
SHA512f9c3c3758d884de8bca7a701d1cdf855f54afd1d94bc8d153cf40a54886769d3d2354e6614e715b4dc9090fd64aaa2fd1d61624b4e2de9b2e2f2381289b6d11f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD51a45005a0b4a4973c1300133a0cc3632
SHA10822a12ab2d18c7dc0eb65ef407bb3f9bb657bd9
SHA256584dcc6acdcad684c4080aa1f6b8ad4be716f1aaed126da5f794ef49586919ed
SHA51223b603ef995baa6ce8cf17c83e65c90c6fc507fe78ba4df60d930abad2b1154dd3b9dccca567686831297c3493552970750e8113560f1ca166c9eee99a317aeb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD532f56d709fe58edd245cffbf9a601e4f
SHA131e64876317134deb7676f7a1f8e3c24eb7c9ada
SHA2560928af84ca6a955a050f659ccf27bc8e267f14af2150445ff6301584586f00d8
SHA5120baf7837a4b95048ff6aefe78ceb6093c616046b90399a57f6f53e0e0458574bbee5dbb85ada5ed0eeda64e797fc31b611fdfaba1485296b02e745d6065c56d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe585cf0.TMP
Filesize119B
MD5a3414ef89dceee5f44ad1588f8ab4ebd
SHA15b0e19492935ab9b76f0924246ddf8c4db61a9e2
SHA256fe0492943a8d7e2c9569d21f80916eb0975de74cc09494c2f85c868b077df0ba
SHA512e9cc3588541a722cd5e1e9d0157229409f592770a9fb85bc06a72f983b7deca5fe8e7b19f4c45061e3f5180ed6839712b351acc6ddad739561759f91463ab841
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD51d904b6fe76dfe3f171afb3ae5548c68
SHA1f3477e68c2ba6df35db768c444bd1260823d264e
SHA256015d7235c972ce8b05d439b38322b8c4546d9d4c2974a4afeeacc911f0c7ba5c
SHA51224f788d11e6d9df8131c91f8124ea96b70eb7de82428e6b31df24f915dfe1b89f5019f10a6ef6f9a100b37f1f4375b4aee1c7ec0f9ab049d91ad99489a84c0e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c1c27b97547e49c6872f5f2a0f35643a
SHA10173c55f583770abf3b930d4c7343b89185e7a16
SHA256d810af40ed3da5b13936c075a869c28da7dc2642baeb4b81d6472078404bda9e
SHA512fb78abb051ec43ddf7ab2a917f1365f13397cd017484975b01ad31efc0d2be124eec4a679d0233a8986bb7d4c02dc5e752effa9a783269ed02e5af641404e027
-
Filesize
73B
MD5eabef125304ed56696f07d27dc0a4760
SHA1f7b1959eaad9661d26183f0a39602128c7770501
SHA25616f2e733956a69caf3cba9a7984df8a9072d616051880ec52649d5a25de0b733
SHA51239ec79f7f17cc61719521fc98f8b1f25f58c611763ee56fad334f92f8d372156a636f7630dd049e7c55894d8952af5e7888725220d46d382715c693ce7c9e896
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\CacheStorage\index.txt~RFe58c6f5.TMP
Filesize137B
MD5b45df6ce25b32c98a5ba126f34d4f5ef
SHA1eaa0b8ba78566a836c51d04bf526e10d3024c909
SHA256dd33b4508c8eaf17848b2adb27d8e37d82e32263946e719dcbb82c384dace75d
SHA51285345029f70c420b90ab330ad0475b5cd0e3ec653d40af8b6d95bccc648fe72a9fe0420aff91aaf8f809227d4341dd1ab6689831f9e18bbc32880c8e544457c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\IndexedDB\indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
244KB
MD508214c568f629952f7966f66154f6331
SHA1961c19eb268ade70e9d3dc786d3c8b658886a849
SHA256814dabd3f6ef8118486e392eecf8fe225cccb2f57a8c12fc87ef20eadb6db50c
SHA5122fc8c12fcba39dceb2a6426b486bb28a4ceebba4be9d2df33250b6c3b2c4b7fa3e4b11ea2acb9e61e100ebd1b4421d6b8658786cb0478681280c370e77b7ece5
-
Filesize
244KB
MD59c6c4cd9ed1727efd66ed4486f561153
SHA1862917c44cadc00f5e45dde4db76f7e9fafa7aae
SHA256be5037e5dbcf3bc35ee311176900faedc40a8be386a5bfd641f99744d74f62f3
SHA512352a07f90917cf087779d078a493174644c98318183c488ea410da2be3e703726913b0c3bc506fd79bc0802387a706f9cfd2092876fcba813d8a9a9f62009f74
-
Filesize
244KB
MD5152c45f5ccd3556503713a891161733e
SHA153f607c3ee500664d26761a775c9d95c104a4e42
SHA2561717306708e9994e72aedf22ec87935bb1c13ca7214b4adc1e0596adc7259e7e
SHA51232b285d86bf478acc17e5b4e59f2557c35f27d3d7caed6fb15fc43f19832a216918a1806cef29819ffdb664e008dff45ace908ebd9daa45fb51af8c543739eee
-
Filesize
244KB
MD519223dbaafa4e07664d383497908d3ac
SHA1873c5ac249b850addeae39379501bd5d1ef82591
SHA2565d2a0f5967206669daa87bfa86c3e09834619a3f6284878ab981ae5450377a4b
SHA512c93601d04d00ba3222bf5f9520c8486254432c8ec1d6e96c458e83bbe2291ef345ce35b5afcf347ea208bc7ccb05b45441932b8329f05b746d1252dad5a99e58
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727