Overview
overview
3Static
static
1scape 2.zip
windows7-x64
1scape 2.zip
windows10-2004-x64
1manifest.json
windows7-x64
3manifest.json
windows10-2004-x64
3modlist.html
windows7-x64
1modlist.html
windows10-2004-x64
1overrides/...ts.cfg
windows7-x64
3overrides/...ts.cfg
windows10-2004-x64
3overrides/...ls.cfg
windows7-x64
3overrides/...ls.cfg
windows10-2004-x64
3overrides/...ck.zip
windows7-x64
1overrides/...ck.zip
windows10-2004-x64
1overrides/...me.txt
windows7-x64
1overrides/...me.txt
windows10-2004-x64
1overrides/...s.json
windows7-x64
3overrides/...s.json
windows10-2004-x64
3overrides/...es.cfg
windows7-x64
3overrides/...es.cfg
windows10-2004-x64
3overrides/...s.json
windows7-x64
3overrides/...s.json
windows10-2004-x64
3overrides/...on.cfg
windows7-x64
3overrides/...on.cfg
windows10-2004-x64
3overrides/...al.cfg
windows7-x64
3overrides/...al.cfg
windows10-2004-x64
3overrides/...es.cfg
windows7-x64
3overrides/...es.cfg
windows10-2004-x64
3overrides/...es.cfg
windows7-x64
3overrides/...es.cfg
windows10-2004-x64
3overrides/...in.cfg
windows7-x64
3overrides/...in.cfg
windows10-2004-x64
3overrides/...es.cfg
windows7-x64
3overrides/...es.cfg
windows10-2004-x64
3Analysis
-
max time kernel
44s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-05-2023 13:27
Static task
static1
Behavioral task
behavioral1
Sample
scape 2.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
scape 2.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
manifest.json
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
manifest.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
modlist.html
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
modlist.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
overrides/config/Artifacts.cfg
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
overrides/config/Artifacts.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
overrides/config/BaseMetals.cfg
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
overrides/config/BaseMetals.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
overrides/config/ChanceCubes/CustomRewards/Resourcepack/CustomSounds-Resourcepack.zip
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
overrides/config/ChanceCubes/CustomRewards/Resourcepack/CustomSounds-Resourcepack.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
overrides/config/ChanceCubes/CustomRewards/Resourcepack/readme.txt
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
overrides/config/ChanceCubes/CustomRewards/Resourcepack/readme.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
overrides/config/ChanceCubes/CustomRewards/Sounds/sounds.json
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
overrides/config/ChanceCubes/CustomRewards/Sounds/sounds.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
overrides/config/ChanceCubes/chancecubes.cfg
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
overrides/config/ChanceCubes/chancecubes.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
overrides/config/ChanceCubes/global_rewards.json
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
overrides/config/ChanceCubes/global_rewards.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
overrides/config/CoroUtil/BlockDestruction.cfg
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
overrides/config/CoroUtil/BlockDestruction.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
overrides/config/CoroUtil/General.cfg
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
overrides/config/CoroUtil/General.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
overrides/config/Enhanced Armaments/abilities.cfg
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
overrides/config/Enhanced Armaments/abilities.cfg
Resource
win10v2004-20230221-en
Behavioral task
behavioral27
Sample
overrides/config/Enhanced Armaments/abilitychances.cfg
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
overrides/config/Enhanced Armaments/abilitychances.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
overrides/config/Enhanced Armaments/main.cfg
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
overrides/config/Enhanced Armaments/main.cfg
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
overrides/config/Enhanced Armaments/rarities.cfg
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
overrides/config/Enhanced Armaments/rarities.cfg
Resource
win10v2004-20230220-en
General
-
Target
scape 2.zip
-
Size
611KB
-
MD5
2c9f953e4f4be19ace0b210b341d4b3f
-
SHA1
ee0d758be6e9a2c53e43d43cf73201471be5b0a5
-
SHA256
93e74a120a4e456ac3005231f41687958fd279feaf9108f7fc7f5e78d0ab1254
-
SHA512
5e8827b294cdda60ebd42032ccab129edde7f8b3a5c1b4da5557f49218b71a54f22f74697daf5305801994eae8c9eed7441fc20c47a4dffa456711744fe65c03
-
SSDEEP
12288:w2VqcCEUthCSXlbBXAZ0MtF7F8Wtiib6bPr+m6Op:1ztUb51bFABF7F8ciq6bPr+gp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1524 2008 chrome.exe 29 PID 2008 wrote to memory of 1524 2008 chrome.exe 29 PID 2008 wrote to memory of 1524 2008 chrome.exe 29 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1528 2008 chrome.exe 31 PID 2008 wrote to memory of 1976 2008 chrome.exe 32 PID 2008 wrote to memory of 1976 2008 chrome.exe 32 PID 2008 wrote to memory of 1976 2008 chrome.exe 32 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33 PID 2008 wrote to memory of 328 2008 chrome.exe 33
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\scape 2.zip"1⤵PID:2040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a79758,0x7fef6a79768,0x7fef6a797782⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:22⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2196 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:22⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1468 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1556 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3644 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3800 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3816 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3896 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4484 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3632 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1548 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=784 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2064 --field-trial-handle=1280,i,16371281009135140963,13477860031924313578,131072 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:388
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2256
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x53c1⤵PID:2556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ca9c327abb3e213ece1676b9a3358d4
SHA15a286f9c874a85af891f56fdc2a0fb7f9d661b7a
SHA256345c63c84fcac4baf8682db42962093c9b2659bc4fac62bda94b7f977379b690
SHA512eb4a4162b019f906db16d96039838efb78425d97bec74316ad9fa105b535dbff44a55a1b1c0ed569beb1e61a4a7fe30cd3d0f2b80110f83966029724d2d44f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d777dcf0217397d8f49083cd0efbb698
SHA12c5c220855da07b5f56910cfbd7c502090d8d754
SHA256743386273d8fa3aa654db6ea1c680095388c572c0b00696924e51033e62948d9
SHA512686d255a429a020f8a3ec9d92ad8c1c040f70a19572361e6d1a7feb746edfa226e8d6a46f9fac244b9d10dec7f3cfc95dcfcf2c8e29ae1ba7cc1f559a16c6b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b81a599078079a3977b1b4bb05f9fbb
SHA158c6cb12044df553843b235d70720d2deb59d07b
SHA256af465a10ac87efdf93ec280ac9275a5d7bf25c9a40a679210d664070e3a4f7c6
SHA512d6236f8aec5ca8a018215a15d23533d0456f8c7e574f8cc0660615624b5378fa98b98603a8ff71f597eda799e6022619250a4c9157e5a4f3fd80d864a06e4a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5554461098cdcb558ded27759a67b292c
SHA13971e2632884e216657c4f096b2006d78ba427a2
SHA25622dc9ab91725f8a2d83a3f4351aa5206c3f34956f8229518684eff01d188bd44
SHA512d0d1d439634d9757a54a37bf5a720856665d324b04053dd6442c49f5ad72e461fe9b3da88156e6fe7242110b130584e3dacf8417ce20798bdd195e9bb77e79a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5abbcf1a32197ed513264daa987dfed5f
SHA1599fbe23291d1b517c77f0515b26f3e27fcf0c0b
SHA256e4470620c8beb6f3870250da0273eddddc7b2cdedec6d798e2bea417ba7ab872
SHA512b0baeed49af777dc1c397adc92d28498e37caeb60984ac310cfc7ea8a65e74003b75ec74043701dae1983589b55e5173a84ef5dc2c6a72605a5bc8cd103726ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d7f3cf6c65584037301cde69d906e99
SHA144d5768587d9a03091264a73644751e2e439a28d
SHA256acc4f9b25f7765da323714cbb864ee5146febe62dd74990d5212824ee2c57995
SHA512e23cb75925c6d9c8f751bf5ca7abd4d521573aab862414ea8a15aa0d00493a103111131bac3ffa140e6d75dcb69280a62cf4e8744bce2754fb18c070446b8d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c4122441ddb797abb7ab36583b1b2f8e
SHA10ab2cf0b5d090d22eb189f6762bc6403fe4fd3db
SHA2563dc4367bb943b340487a0ce5ba394a9f5a2a6203cea8f7e82a23e3d8ebfc23ae
SHA512728e799671b9bf62c9bf0db5c40d1e8d95978d128b01eecc599b5b5507a68a1ea6c884e96625f5491e400263a81f92c3ee376e0180c9375c3c53e7780e4e619e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1bd229dd-222c-49b0-852c-25ecc835b646.tmp
Filesize5KB
MD5dc48a51b5f6a303a28a87c4137a0179d
SHA1be8b3cc91139ea6a74a066b4addcba31a47cee7b
SHA2563ba5542feef7f9692f9af501dcf3cbf88192d2ebf0effaf2c14d7d8a17792a38
SHA5123c55cf8a0032a4a17dfd775031774e95fa63a348807eb8c51a36553ff714b21e07acad8b26f10763ed0a274c928d25503e7b1ab4cc7454aface2bc460e7fbc73
-
Filesize
37KB
MD5519005befdbc6eedc73862996b59a9f7
SHA1e9bad4dc75c55f583747dbc4abd80a95d5796528
SHA256603abe3532b1cc1eb1c3da44f3679804dd463d07d4430d55c630aba986b17c44
SHA512b210b12a78c6134d66b14f46f924ebc95328c10f92bfed22a361b2554eca21ee7892f7d9718ae7415074d753026682903beba2bd40b35a4eeb60bf186dcdf589
-
Filesize
20KB
MD539307e27138b106e53f1a4af27d63094
SHA19c2fbfb3f19bf72a282a101d1c802c287dbb5fab
SHA25607c09b206faa8934e6b12c518a4f834d8bd5b2bbe92a07a4f169173ab620b464
SHA5128e48c468cceab8dfb296c62c2fcf4e82adde92fc06e3b14418a4cc08dea5712aaa7f61eb5421b9d5fbc0803b1b8f2b05a344a2e3db7831212af9e2579972bc52
-
Filesize
1KB
MD5903ab0a64fc6f5ac9728e3b51ba66c35
SHA10bdb4ba9cc69f7ab32cb729e10f7e0d364e415d0
SHA256f00745df9bf98f2586ec71f06027ec04b630d5a712107b45bd7436d2765f7070
SHA512629704dc04d57bffd3e46985ca2c7578c5431a197c03b5344e02834bc19bda486012a6138914f3321f197df037aa1e24c60065302a4d79240c08e394658bf22b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RF6ca5b2.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD51dafe889c02e361bfec52f36e02f0abf
SHA1d5fbc42f3068e153f6885793d43238329db69238
SHA25694319723bc98f6072a96b511b01670ba3508ac1e57ac4dc4d7c368b190ecf1ed
SHA5123bd62c85f7976c0cb1090997d6b2b37ac3b8381c54c8fb142042cf951df34fa0ddd7c5b5931687ab902a1af4b28592f1049a59c650409fb88350170a13b12676
-
Filesize
1KB
MD56faefba57be64f250e35772c68e9483c
SHA1522799a502b4e3cd9adaa16af5c2dcf21765c89d
SHA2569989fd38a83129d593b6a234e6dd9ab4a0cdb71c88107b946456b1dbed52cc46
SHA512e80ed15f04e66a4c9dec6877b0468773613e519dc8e66eb7632447fdab388d4abf171176daa3151bea5e3f5a474deda2fba0c9c6625a96796c09171eb42bfd49
-
Filesize
1017B
MD58f35a1b75e161a14985f8954001eab22
SHA1a705f5ea927d9b05b1ab90f7dc9241ca836afe6e
SHA256a042e57de6e8f77809d6cc4f2edffe99b83c9f3a14de0725bfb8c46124a96195
SHA51294f44fdd744cdb9f38aef1b60ff2b1c3cdb208f60db52545abedab1e351b68ec631282fecc18499552052e588b4d6199760b4225852e352f69bfb816bd522f98
-
Filesize
527B
MD5e1af604b71a5b0513e47029aca05361c
SHA1f2e26aa3d20158112e0f08bcc262ce96c09ebaa3
SHA256e0bb8cdcb81c3693ff31bb3db616b1707e06afa635061c4f7718b81bed1a8a0c
SHA512cc031327cce6c5c75a4e706a72165deb2a0267d131bbb78d9441f19a819a7a1b376430c70a65847bc4e6e25e6317dfc23158201809acf8dbb97dec8e019e6a80
-
Filesize
4KB
MD5f5b5e34b3bf9e41839e97ab734895a47
SHA15c59b1e8011b32da8496a69e2976796279a2fcf6
SHA256e55d4b61f7e335cd25a186ee27effa988777bcfcc29ec6ab263d067b69507223
SHA5121b2620d19391d148fad84ef02f4d69c82ca8b6afc7cab1ffa278d16fcdbe223570cdcbeb437e9108d5fcb96926cfc599417be252d2c8ef20c0513936c247a597
-
Filesize
4KB
MD5a840eb9643b1d26dc42610ddd025546d
SHA1d70dd05aed5b74dea7b34ae01bfc5142d312f74b
SHA2569775592646c9171dc1a6fd9d78f5c32785cdbd937cae43bc28a8f32aac03e386
SHA512d256de31f69000696215c1d1c55a4929be4bbeedde69a189a5b1dcdd9c29075a885c867ce0b7169d1904371f88dada69145a7da8ad0b80aafbf866f929da1262
-
Filesize
4KB
MD5be117dec386c9b3939a49853385c363d
SHA1e48c5bedb75a57b976e55d21943c0daec0797d25
SHA256edd426585a11e7b109618c78ed2d4700d37849413698ab866dddf13ab9cc3129
SHA512fe707ec396417012b739c0e6b70efc13e8ceade36dd06f868d39565b8d889a645c4eee2a63b27de2c782a951382c523d4e306202e07ae4bbef3bc1f3b0972b91
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
154KB
MD5fa3f04bce0b219416693e497aed7ffde
SHA1d8a246af50bf65d7d745d74669fc63a5f73258eb
SHA256455ddd959c622cac2dc0165f79648e3aa21050ce9b054b65667c5034fdf1bf4c
SHA51288f02f3457e1196dabf6824e41504fe932bb79040ed97e0fb42de3aad56fb0015debd31027fa89f3580bb0264d231543b20eedf3c71d20c3f96ba7e79736e9cd
-
Filesize
154KB
MD52db5cc47e06142a524c8323822e5055d
SHA1dd00abb033445f45b1cbc4e9e8f3af34ad2ffad9
SHA25604f5353821136f741331d67b6755a523285e0afb8bb54d89b69e201f0e7edf3d
SHA512a7162b95d10f833a623c31787ce47d3120b4081a1929c893f20c820d6b2f676c749514df702a7db59361edbe35db8d82b2e64bf3e539c8c33e3a6596b27170eb
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27