Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1DogeClientFinal.zip
windows7-x64
1DogeClientFinal.zip
windows10-2004-x64
1DogeClient...nt.jar
windows7-x64
1DogeClient...nt.jar
windows10-2004-x64
1Main/Clien....class
windows7-x64
3Main/Clien....class
windows10-2004-x64
3Main/Clien....class
windows7-x64
3Main/Clien....class
windows10-2004-x64
3Main/GuiHelper.class
windows7-x64
3Main/GuiHelper.class
windows10-2004-x64
3Main/Keyst....class
windows7-x64
3Main/Keyst....class
windows10-2004-x64
3Main/Keyst....class
windows7-x64
3Main/Keyst....class
windows10-2004-x64
3Main/Keystrokes.class
windows7-x64
3Main/Keystrokes.class
windows10-2004-x64
3Main/Serve....class
windows7-x64
3Main/Serve....class
windows10-2004-x64
3Main/pos.class
windows7-x64
3Main/pos.class
windows10-2004-x64
3assets/min...pe.png
windows7-x64
3assets/min...pe.png
windows10-2004-x64
3assets/min...go.png
windows7-x64
3assets/min...go.png
windows10-2004-x64
3assets/min...o1.png
windows7-x64
3assets/min...o1.png
windows10-2004-x64
3assets/min...er.png
windows7-x64
3assets/min...er.png
windows10-2004-x64
3assets/min...r.json
windows7-x64
3assets/min...r.json
windows10-2004-x64
3assets/min...b.json
windows7-x64
3assets/min...b.json
windows10-2004-x64
3Analysis
-
max time kernel
48s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
DogeClientFinal.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
DogeClientFinal.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
DogeClient/DogeClient.jar
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
DogeClient/DogeClient.jar
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Main/ClientInfos.class
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Main/ClientInfos.class
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Main/ClientMovementInput.class
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Main/ClientMovementInput.class
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Main/GuiHelper.class
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
Main/GuiHelper.class
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Main/Keystrokes$Key.class
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Main/Keystrokes$Key.class
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Main/Keystrokes$KeystrokesMode.class
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Main/Keystrokes$KeystrokesMode.class
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Main/Keystrokes.class
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Main/Keystrokes.class
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
Main/ServerDataFeatured.class
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Main/ServerDataFeatured.class
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
Main/pos.class
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Main/pos.class
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
assets/minecraft/Client/cape.png
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
assets/minecraft/Client/cape.png
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
assets/minecraft/Client/logo.png
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
assets/minecraft/Client/logo.png
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
assets/minecraft/Client/logo1.png
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
assets/minecraft/Client/logo1.png
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
assets/minecraft/Client/wallpaper.png
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
assets/minecraft/Client/wallpaper.png
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
assets/minecraft/blockstates/acacia_door.json
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
assets/minecraft/blockstates/acacia_door.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
assets/minecraft/blockstates/acacia_double_slab.json
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
assets/minecraft/blockstates/acacia_double_slab.json
Resource
win10v2004-20240419-en
General
-
Target
DogeClientFinal.zip
-
Size
11.7MB
-
MD5
ca9cafb333a55f8c2deb3488658bffb8
-
SHA1
f9e54bbfad392be8fe1ba0a2d7ef15219a8d8884
-
SHA256
fc788d41f02145ba4f9086674464826cc596a0843b73b285f2ae3426439b2d82
-
SHA512
00767131e72a3564f44f833525a8ba6af04ae9cb2b7c2db9318ee2003972afae5d312ea1bcc4eaa1cd5f03ccbce92c609c69e1ac5469abe7062abdcc8d3f0d96
-
SSDEEP
196608:qiGd/QGvNr3iaea3uRsELpZlqvpAydNBhsbRasu/ZP3CvBYrEC6wT6cC6:qnbzi/0uy44dVbsug5YlNn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2392 2148 chrome.exe 29 PID 2148 wrote to memory of 2392 2148 chrome.exe 29 PID 2148 wrote to memory of 2392 2148 chrome.exe 29 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2624 2148 chrome.exe 31 PID 2148 wrote to memory of 2468 2148 chrome.exe 32 PID 2148 wrote to memory of 2468 2148 chrome.exe 32 PID 2148 wrote to memory of 2468 2148 chrome.exe 32 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33 PID 2148 wrote to memory of 2808 2148 chrome.exe 33
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\DogeClientFinal.zip1⤵PID:2028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f89758,0x7fef6f89768,0x7fef6f897782⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:22⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2220 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:22⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1304 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3024 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3552 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3876 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2448 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2264 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3008 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4188 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3912 --field-trial-handle=1368,i,14399165350498482904,220802902140715197,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5db58814e73b8dcf7bf565f2cab11d7c0
SHA168a11b423c9cb3301955a360f2ee7c37d216afde
SHA25686884c4eae6f40374250b89a320b020427ddd9b01cf598ff6f6b9a489e804f67
SHA5122244b518e697dcf61cdfcd13a614c605df140a789905967318a790e1d990713e3e79b25d051b2c8fe168da212bb7833242df7c0de81f7d866b9f5817b3621f34
-
Filesize
19KB
MD529ad9ea37ce397f90a9b0322792a453f
SHA1e0ae24a29fe1daaecadcb6f6db1cd6e3d051a273
SHA256e7ac7314e4507f160cd0c863fa5c2cdad5c8a0fe83d5421e184b9aea877c4a84
SHA512444c3999c3673d298894d99c61d57cbebac28da2aa63826764ac8ec21b0eec81174b4e1483391bebc55b4a81e1b9e17d97702f3cd995694488f4821a33addb20
-
Filesize
46KB
MD5b322e56a86b24d52ba6c2a10614ce78e
SHA19a990a198453af55e2c86f8a85ef6eebcb296f4a
SHA2563df48c3c951cd9bde194b92d644cb82eacb0ea91d01761fbafb645c4462b816e
SHA5120aa6f828d3a3472325651075887379ad159c348c4399b10e0c3b2556d52f879e1f57b4e8a80c77c1845653d0fa50c8b228c5ac684ca70b79b98c245e4d38ebe1
-
Filesize
792KB
MD5138e0d87bf9b3e7e0ac905d20abc91df
SHA1a306dcf04ff266d6d5acf9a47d2e9d91c6a4ab2d
SHA256e21049905a61839144025097a996d45992869a4f7a5281491e1a0d43ab00319c
SHA51291f4753eab0c165b57703f4f350274553d0fa75d67405761a81468f6f311c0890486bf8115fe5c3d1829f133e861642912fd8f05472a819141178b2d8f43b001
-
Filesize
32KB
MD5c33965aab974570437a0ca48eb2e62b1
SHA148974a67d6bed0a15da4a83b23c4451998cff7f0
SHA256f570e6a83a0c1deea5a2fb8014d662705a6c815a0c168ee4798b6f94e8833208
SHA5125008ec571d1e01321673992ef6b5104d714581d8809c219c7266d41e61c2d6e463ed01cdf56d0677f1e2e6fd7c49ef0bbe4ebbcacf8a84785ef4821635cb61ea
-
Filesize
32KB
MD58b46159f0c940fc3e6abf99185f44f11
SHA11a2e27feaf823cf1a84a203d1bcd320a7f6771d1
SHA256c77f0313cc7771a1dbcb739c98e4a8387669747c359cb59593b13c3891164979
SHA5126e780c00db95c810b62752a5335e214d815aeaedaa220fda93a191b514d8d6a077e772665a1ba7f321d124c17b1d62a4f4b3837e4e4c65eb3d4e029999389560
-
Filesize
816B
MD5ec0173473a8e1ea6957bd625e357946e
SHA1204fb6152d0978b30145669ab3ec9e870962fcaf
SHA2568b2b01f706f90709953eb3c256599bdb4546b21cf4549ee88bfe95e33db10e00
SHA51284bfbccddd76e2511a3674e6f65018a889b85b4d321f02e20ddc53f39f80e706f92f810642b2b3dc767f84e76fabdb812cbf5a48ee87f37015eea7ad6182c627
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf769119.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1018B
MD57deffdcd6432f473b6d114d23f007deb
SHA1df38c04b0d67c1afa6c26f816cab90efbfe8d31f
SHA256fa6336c727e0675fb216bdacd7ce43b0435c5a3d41e5c1918b775cf97f9169c0
SHA5120dbc82b6793e9dff54184e04852680c5a141a01bf960747e144d8140efb9e65d4682e5f0c44dac9b32d117c081b6712ea2c33a6ee7a6fef6640ab8f45ab606fc
-
Filesize
527B
MD50b6c9c04acf4a943570e39777e7798dc
SHA157222886ea22327842f200d78a48b0d698038bef
SHA256e3d9d7cae6af88781e06c6adb47ab33844efb29cd4c1eeb4fcd0df320d571a8a
SHA512348d3db5d0a2b3129c7ce91d7364ded134dd3c15f928d6fb44619462c3b2733981f97f7e3e9e15bd160bb661078a93d51195721bfb073b9f514892341b36670e
-
Filesize
6KB
MD513b6db801fed9cacc0e9db8d550321d5
SHA108b8f0fb75967b7642ea07e17bbdf22a73825e6d
SHA256edfd1ab638b775d5b800f251a268064c8ac3f0bc4cd99b41f79a57fba048f80d
SHA512a747315fba9124234ff1dff83baa0323db51d9a81524de277cee7b69adb82c74b10d8a98d9753f197277947cf722dde311bb5dff27dfce13a843f7b2ab1a8179
-
Filesize
6KB
MD51c1d6605bfa08135f097260d82c01d4b
SHA11fa7db32e15771bcb034866bfea2b9e3fe8da633
SHA256fbf08e547bc5321aca0f472a634d551e42130123cc07853e748046eefaab365e
SHA5120346dea7d255bc92f41c98ec4766cbb91a188d51efb754bff8bc1178cd3e5705a0403e858a7e8508d3ff405969264b6cc5799555a9ee8a8db2ffee087477a1bd
-
Filesize
5KB
MD5fb4e68709d3eb96c21458f28692cf9b2
SHA183bd6ee4e50919d0f965af762a8faf313704897e
SHA2562239d6d6e8adefd1d90d873b2babd1882e284f312ee98e5d9856de2c6d4abc1b
SHA5120c094308e469b7b59f702af0251640376fc6f19453eb139eb6ce25f61877e8e423308a9aa2281e7996a3642441c5bcf47351772946a444142d4e8b840b93c227
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\93dbf34a-d980-4bab-b347-6b4bef56b2cb\index-dir\the-real-index
Filesize2KB
MD56b559b11e30218c0d738b243d23e4b98
SHA11981fc136254fa4fdc9bc0cbc5c4b88399c3fa47
SHA256156cd89e87bcd38820df4dcf92261e6ef687287bb606a92d6d844d5c82862c2d
SHA512a51a0d5253bec7a62913f31c2179241569907305fb93b0da25c6f5273d376f39118432e3190c2519fc89f6ac3bfe63147fe84589f3aa5ff589c2ef3681f374b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\cdff749e-a4ec-4b69-8e8a-e480c6453969\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5535973ea223a0cebc45234ae2524f43b
SHA15ed89f994aca8dbb8dd9a415acea8a1a64d88015
SHA256f609373e0afb701c9f85ce5713d6be69c450369ef51d6b2ffe4e6ea0796a92f0
SHA51261f87c669fd85d9f6a73ea3d7b673871e8a45f949413e7638f46d578905a589a68e9f4648a019f49dabeb4306a3fa6f9528e5040a26685c04be836d477d3dc17
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize178B
MD5825840dbe245559c8e79a0da3e103fae
SHA17a1cccc3a0d7a63059d03360a674b06fc04cfb58
SHA256a13b1aa8e60abd5009bad58442fdbfe768cf8f6e051938d5ee7b7541caf74b6d
SHA512025e22e80bfb3956487875a02f2bbf1f70b2569d435d76c6f231e9bf0e5308ba1ef0dba956639b59273091307dc8eb4aa15f3a553928dc431e4b81da198efe27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize183B
MD578b93e7d0d796fac75e53234f7b1d2ba
SHA1a6558210bd4add3883b7b709e7d5eadd6bfeb335
SHA256cf0fbc9b84bf9367e63696fedd771f79b0f7036d41414c92d51d564e50772acc
SHA5125f9008e9e40d1e23f9a8d47779b6bf40dca4c279e90e4b9834205459860fbdb0461723452217250c091de2a66f9f0f2f522125c574e17b4726a372c89bb34332
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD55abb4250571e2ffd514947d8b7783c4b
SHA10759ea7e8d1e1cd82b5e8fd482de655e90a20181
SHA25631f6aeac4d99bdae754c10ace251b1fd5a3d3e9149b721cd15f159035ffc4d4d
SHA51233838526445849d4e87cc7e31f53dc7b82a66a17531e54c413f5761b5639c2eb306603a679ba8934b9811e14d3a8cce5bb04602771f58541598d3ed57bfff39b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD5e6fabf621af66a97b3dfc4ff2b2f015a
SHA1c74fd68715f7dab2d3f322b2b6e85d53caa41023
SHA2560b5f3f3cff951c63002a3c02cf4b9519c00b814495e534a734f04ebe5c3a8cda
SHA512d7f657443c3b74c6f13011c2c19e93f0bf8c7ef2c128a3ef04119eeac3f43c314517f4a8d1fb87fc8aab839d6028826302e3b6b93a294f6ccdb046ba8bbcf354
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize187B
MD5b30b2f572a30e2fc744bc531e2fcb45c
SHA16a368c4cb84ebc5f7a1ea999721a19cd729250bc
SHA256885d79b45481b965d93b3eed5da9d67ffbe1edb0c54cc257826341f9395ec002
SHA5128a0a34848f545f9e37abfeae41b567abc103064eca6607c19e20030b059f9dd7766e5cc8dd136b455614e9e8ccbead33f476997c1396bf796203a1d1c90fd2db
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Shortcuts Menu Icons\Monochrome\1\512.png
Filesize10KB
MD57f57c509f12aaae2c269646db7fde6e8
SHA1969d8c0e3d9140f843f36ccf2974b112ad7afc07
SHA2561d5c9f67fe93f9fcc1a1b61ebc35bda8f98f1261e5005ae37af71f42aab1d90f
SHA5123503a0f4939bed9e1fd5e086b17d6de1063220dffdab2d2373aa9582a2454a9d8f18c1be74442f4e597bdba796d2d69220bd9e6be632a15367225b804187ea18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir2148_1754961337\Shortcuts Menu Icons\0\512.png
Filesize2KB
MD512a429f9782bcff446dc1089b68d44ee
SHA1e41e5a1a4f2950a7f2da8be77ca26a66da7093b9
SHA256e1d7407b07c40b5436d78db1077a16fbf75d49e32f3cbd01187b5eaaa10f1e37
SHA5121da99c5278a589972a1d711d694890f4fd4ec4e56f83781ab9dee91ba99530a7f90d969588fa24dce24b094a28bdecbea80328cee862031a8b289f3e4f38ce7a