Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
8Blank-Grab...er.bat
windows7-x64
1Blank-Grab...er.bat
windows10-2004-x64
1Blank-Grab...OBF.py
windows7-x64
3Blank-Grab...OBF.py
windows10-2004-x64
3Blank-Grab...der.py
windows7-x64
3Blank-Grab...der.py
windows10-2004-x64
3Blank-Grab...ess.py
windows7-x64
3Blank-Grab...ess.py
windows10-2004-x64
3Blank-Grab...ess.py
windows7-x64
3Blank-Grab...ess.py
windows10-2004-x64
3Blank-Grab...ar.exe
windows7-x64
3Blank-Grab...ar.exe
windows10-2004-x64
3Blank-Grab...un.bat
windows7-x64
1Blank-Grab...un.bat
windows10-2004-x64
1Blank-Grab...ief.py
ubuntu-18.04-amd64
1Blank-Grab...ief.py
debian-9-armhf
1Blank-Grab...ief.py
debian-9-mips
1Blank-Grab...ief.py
debian-9-mipsel
1Blank-Grab...tub.py
windows7-x64
3Blank-Grab...tub.py
windows10-2004-x64
3Blank-Grab...px.exe
windows7-x64
7Blank-Grab...px.exe
windows10-2004-x64
7Blank-Grab...tes.py
windows7-x64
3Blank-Grab...tes.py
windows10-2004-x64
3Blank-Grab...gui.py
windows7-x64
3Blank-Grab...gui.py
windows10-2004-x64
3Analysis
-
max time kernel
113s -
max time network
214s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 20:12
Behavioral task
behavioral1
Sample
Blank-Grabber-main/Blank Grabber/Builder.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Blank-Grabber-main/Blank Grabber/Builder.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Blank-Grabber-main/Blank Grabber/Components/BlankOBF.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Blank-Grabber-main/Blank Grabber/Components/BlankOBF.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Blank-Grabber-main/Blank Grabber/Components/loader.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Blank-Grabber-main/Blank Grabber/Components/loader.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Blank-Grabber-main/Blank Grabber/Components/postprocess.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Blank-Grabber-main/Blank Grabber/Components/postprocess.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Blank-Grabber-main/Blank Grabber/Components/process.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Blank-Grabber-main/Blank Grabber/Components/process.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Blank-Grabber-main/Blank Grabber/Components/rar.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Blank-Grabber-main/Blank Grabber/Components/rar.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Blank-Grabber-main/Blank Grabber/Components/run.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Blank-Grabber-main/Blank Grabber/Components/run.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral16
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral17
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral18
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral19
Sample
Blank-Grabber-main/Blank Grabber/Components/stub.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Blank-Grabber-main/Blank Grabber/Components/stub.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Blank-Grabber-main/Blank Grabber/Components/upx.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Blank-Grabber-main/Blank Grabber/Components/upx.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Blank-Grabber-main/Blank Grabber/Extras/unblock_sites.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Blank-Grabber-main/Blank Grabber/Extras/unblock_sites.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Blank-Grabber-main/Blank Grabber/gui.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Blank-Grabber-main/Blank Grabber/gui.py
Resource
win10v2004-20240226-en
General
-
Target
Blank-Grabber-main/Blank Grabber/Builder.bat
-
Size
1KB
-
MD5
69f3538d09da509b93329b22fd59a956
-
SHA1
d74ccc96102895e111712beedabcdc725fb23360
-
SHA256
79e1377ac17e6aece067d4cf6a202d8baf43a9906cea353de7188c43b20500c8
-
SHA512
a5e2fdeb2d185acda43e6a0d964966fc5246d2fe598d094e0b59bd757c42170d3e4125cf7da736080a95141b453d12a53af295eb53bd64e431285e8213da9b07
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2472 2592 chrome.exe 32 PID 2592 wrote to memory of 2472 2592 chrome.exe 32 PID 2592 wrote to memory of 2472 2592 chrome.exe 32 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2360 2592 chrome.exe 34 PID 2592 wrote to memory of 2284 2592 chrome.exe 35 PID 2592 wrote to memory of 2284 2592 chrome.exe 35 PID 2592 wrote to memory of 2284 2592 chrome.exe 35 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36 PID 2592 wrote to memory of 1728 2592 chrome.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\Builder.bat"1⤵PID:1192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6659758,0x7fef6659768,0x7fef66597782⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:22⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2356 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2368 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1416 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:22⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3236 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3812 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3480 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4004 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3448 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1652 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2116 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4052 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3912 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2044 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=756 --field-trial-handle=1224,i,1254944198324561385,15793566021491661596,131072 /prefetch:82⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD50594ea07a4b65affbadaba512555ae25
SHA14647aacd53ecd79e742fc03eeca0e047835fe6b0
SHA25652a13d78a9b00fc6c6b7c1f86ab4c64dbade4f72883a60252e37bf59ad993b66
SHA5127f1e6c6aa0f01ce4ffabd0a9435a90dfd48266b57ae56bdf07d32496f22674f96c9d86e0f2ad3ac92f3963fef617ecc616b139eb909e91e3383cc537ec2187d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf21aa272936b59a08a4eabd16cefd91
SHA157275e0beec346a2ed53e8b961bcc1f8ff212471
SHA25669ea3c82f844e41b2add862e9a6353b895f3be3672a2fe082039776466972635
SHA512a8fdadcde6d104123dbfd775ed98b4933209c7e73f607c09ac1790579aba1d8478356b785d3e1e363104f287c0442b569b60f5c9a89562b2e2f187bbae684b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2ffdd1f2f778bd0228601b8935eb948
SHA111874239873545ff77f52ddb031b48f141c4b21e
SHA256ee09ddfacf5d2836fcb189a0f082547ad90962105eced6d71804d9a39f0ec0de
SHA512544d6ffd60f66baa6fc251a2faf09c39d1f25fba6feb4424ff661b1e88dace23d11721532eb7c2e42df50e190e6cf8fe81a6e0334145aab8b4bc0ff5e15b7c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b27b4d795c5010b125de8128d933c8d
SHA181ee0c5ddef957282ab224b5ab44f194f432d01f
SHA2562f18922a7f26f4242bb54b40d753799af17ed69dfac4897da18c843ada498d6b
SHA512655059b97f4e2eda2b29ef6856de635649a07d6bd607c266d7e7183e3ad587f28459941557f4bd7ad78448dd9650ebb41f08018254c413b130331e07a0f82a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591299c5fa6d6c9b83dfcb118d9ced903
SHA1d6388c4e1763b7b2518074fcc51b19d74671c0ec
SHA2563afa1832565d90ad5444f390dd4a09a6fc9374d2750a48ec71ec75ce97f57742
SHA5123e5d160a9f8572f5be08f3a309b1bd62b12b899023c7381ea5b6914ebcc6388512bb31c0af0a9322dd5b495695654cddd816749daff1d780b8f685d8d962445e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD567231b544c15e6684d0fabb6f8dfb7eb
SHA1f1085892a61daef470480d8441315de8286a91e5
SHA2566eda5e26f302ed5b509aa288c37cd24e0e909d56956554683c150f55021b479c
SHA512c7195db1233930c3f2f3f109e92c7eff7094687e510f0ab9debe5bd2a97029c401fe5a8d3dbc7cff6598846974eeddc670c276d2cb1f860f1775f5a0e33470d9
-
Filesize
363B
MD5e967436cae045ae3f40385141d8d449c
SHA139e0aadf36085c456ad016ebea572c9b4e6971a4
SHA2563331a4471894dcf5166df4c16a7dcbcf1de6436ba35b5887e856cf8e87fcc3b6
SHA51247d67c03f2af20f1fd407c0efcc297a18078ccedcb76d9efbdaf8ad9b722fb01f4496c64039f1a00ebc89f4c9e816ab00bcc6eb19e439d4e6a7d9ab2b00fb833
-
Filesize
4KB
MD5994c7044a4b5d78a89c2370695138af3
SHA1191401057e8e26393cd72f1c4d6102e6c0bb66fa
SHA2568df51f823173fe43430cd71c9c10061224f48f3dab366d04933015f8d4245fd8
SHA51259e717900127f22d10219a08a656881b5e9128b2df92ae9a48eeefbd22bec2d9fc19135d91ff810c71e13b5a869db0a8cd2a5d357e7e2547aa09a75c7fd7a11e
-
Filesize
4KB
MD55c9377132adb2a7a7d2162b81f7f6d08
SHA14d456b51d130880c6da662c4630c68c1dbdab28c
SHA256e918eb9b1de4a1aa6506836b0d2344df63c8907ea3364e9263cab1ddb62d84fc
SHA5123aa1d7c4ac29c3a5e29fadb827d3abb389b43033ef19f89eaa4d126ae7ef3d0a75d0cc34a787fa3500975d808c759da227eba35250fdc4ad65c705378edb645d
-
Filesize
5KB
MD504d036f31e325243bdccffd36ef407f4
SHA1dd6e0e0550cf5e398df1f2ab3a1cd19d53f61d53
SHA256b9c1d019ff83cff4af2dacdd757e9d654140f0d955dbb62e0ff658a8eb8a972f
SHA512f2319c117c7034f0a7cc66476792965c7b7fc871dde7e773f231bbb01864e37a85a52d6b172c7b33feb9d1468d16cea56efd78e12f4b9f951bd69fc271005cc7
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63