Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/05/2024, 19:13
240502-xw2mzseb6s 802/05/2024, 19:06
240502-xr2gesea9w 802/05/2024, 19:03
240502-xqgqmaea7w 1002/05/2024, 18:59
240502-xndwysga69 6Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
بهجت صابر - من ميدان الكسميات ..mp4
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
بهجت صابر - من ميدان الكسميات ..mp4
Resource
win10v2004-20240419-en
General
-
Target
بهجت صابر - من ميدان الكسميات ..mp4
-
Size
1.9MB
-
MD5
60134762845141c1071ba1134fa5d712
-
SHA1
5f93f2ac13f1d2f4de8418b768b7953709c643a6
-
SHA256
8f76628c5258074c8a43a644bab240c1b6b5d73851831580b328e4f5bec90687
-
SHA512
2a6951e6601d515c1d84f3d5d81d27866b3df1999f65b341ca1021521a8584182dabfbac342cc68ef159a6e41c42459d5f3d479ed5653f465d51cf7a8391f33d
-
SSDEEP
49152:54lDV2ACQ8GSpLt9ndqqgtqgtaKOWOHxomZjmQ8Z3:6lDV2ACJpvndPEqghOW0NjmJZ
Malware Config
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2180 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 vlc.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: 33 2180 vlc.exe Token: SeIncBasePriorityPrivilege 2180 vlc.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2180 vlc.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2560 2688 chrome.exe 37 PID 2688 wrote to memory of 2560 2688 chrome.exe 37 PID 2688 wrote to memory of 2560 2688 chrome.exe 37 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 952 2688 chrome.exe 38 PID 2688 wrote to memory of 2396 2688 chrome.exe 39 PID 2688 wrote to memory of 2396 2688 chrome.exe 39 PID 2688 wrote to memory of 2396 2688 chrome.exe 39 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40 PID 2688 wrote to memory of 2420 2688 chrome.exe 40
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\بهجت صابر - من ميدان الكسميات ..mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2180
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1560
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2172
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1456
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feee9c9758,0x7feee9c9768,0x7feee9c97782⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:22⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1692 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:22⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1380 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3196 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3596 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3784 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3184 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4044 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3964 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2944 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3048 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3948 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4136 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1160 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3012 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=1388 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=2948 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4708 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4728 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4760 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4860 --field-trial-handle=1348,i,10219226019128350860,12281849469399138295,131072 /prefetch:82⤵PID:1444
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵PID:356
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD59c7c1ada6e6e87cc57328ab1000a8614
SHA18d5d38682e2a362c67f570c81dc35d8d6ba4c9a5
SHA25622c8ae04eec61d463c18a589c765b466ffa8ccf3539f931249d131017047adf1
SHA5126b29ebe47ecc133ebab99a2a19647d3128fc8b28b08ee9cd9ee62030c098f640e1b7028e157f1ebf42e2802d206dd88d8af3b767b509342d95568aa91af84944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526bb441b339ae748126f5aed358232b3
SHA1ae642e0fce28967fc0b8ea127337c3f06e163a5f
SHA256acc119bbdead0a802aab0570f983c233248ac68b98ee66941c1925d6c8486f76
SHA512f3d27fe998a65cdf3cf49b24f2bd76ce4a13e13202af3573e9fd4252235d88f24d2af841be33c850e7ce7949ab98dd76a11d897d0b88beef14ebd53f3c6e7637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a456fd130b0dd7dd41cb9c5635950c70
SHA14c8734d6c951bad3a1aa1c5712d47e82f06a87e2
SHA256a74744a3d0d1aa7c9bf582b6998656d42af7ec11ef8dca4aa2620f2ec754717f
SHA5126c553fd456001644e688b077d194ff5c6c115f529b544e98d2e5bfa2a817dc2bc02e7198c212444bb77be290a883af27b7a56b420d0fe5fcc0b7f8dde89a961e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea9858b4a4090b0aafd8e3af3dcea19f
SHA19fd8c75a26804c11dbb927ee4761ed25dbc2bf10
SHA256756a701dd2587f9a6d922dc24a0b923ac33346e05f12089e61287715f672fe00
SHA5122bede809a4376e32cf204928bb6a49e7b81e403c299a34560256fb95c096d65d9fc22bc63000ac95761aa3a07170f0f9063e6580408e8754015b6f8c8e4a1de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e505ce3e6d5054cea232d13dce9141aa
SHA157676e9a98bf7cf95c7290a6f4ed1987974d0540
SHA256382c2de9be2d6c34c2541e620c1f04a613958eb6bc3ea199b756774c1f679e83
SHA512478b7fbc2bb98b1eeefbd697928494415da88275b3b5115587678a52cedb79e78fc52301fc85fb2bcee11077ebe3520ab0407e25179903bbaa22bd912ba1c0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b41acf9c8312d81c9e3f7266b4f7fc4
SHA1bc3ed1071fb20ac836a427e28f2de99dff875d2e
SHA2562ff992e1c76cd8627e4f20da6f02ca26fad03845cb0efd38c9ab7553bd1e2176
SHA51208d618579899bc2945d9b262a2107b14f16a102e759c561f5d5bd792cfa45b9be3107a73bf65df57dae1348d20be17401445c52f77e58abd793f96d31b5ef195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e54c569f6eeec2683d4bce2ad0517a4
SHA16ae6a59a6f193cc89241b25b311810128c8717dc
SHA2560056279664aac59ba160bdce835a6ca174dc00ae928c06fbf2750d0991ea56e4
SHA5121a19117d89c1f3c9b73fdafc49ef241dd22714f2190a33a6d80b7490845ab363267cca491eb1be88ad977027c3095c9e327372fea75bdad9a396b2ab8158431c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e90e166f3d817db02cbfb447f090f4
SHA1abdd51b92eda6adb324653e72189a613d8eac48c
SHA256a434e0a5e43a61bd37294c044f16f6bb3ad84fdd1e3397fa193340fce8401b73
SHA51289494c45c048f2b768ae71424ca8219c57044a5f5e4b324439f04a5740f5f44f51f712217c47dd5d60d7713fccb0af5a6aba9b0b3148ff154bc0d11deb344e83
-
Filesize
24KB
MD587c2b09a983584b04a63f3ff44064d64
SHA18796d5ef1ad1196309ef582cecef3ab95db27043
SHA256d4a4a801c412a8324a19f21511a7880815b373628e66016bc1785a5a85e0afb0
SHA512df1f0d6f5f53306887b0b16364651bda9cdc28b8ea74b2d46b2530c6772a724422b33bbdcd7c33d724d2fd4a973e1e9dbc4b654c9c53981386c341620c337067
-
Filesize
68KB
MD5f203d75a70ada036423e83070526987a
SHA106e072c8d3880fb8cab740f01308fc44cd211029
SHA2569eba99bb152b450919ff7bddc78c09e5eb0c857659b4fd593c94087d289ab255
SHA512aba05ffe088c648093719cf2d25fdf46a7055583aa496dc8ef6b15c2ccae8d82c91d102edeec3bca5d6556a90c6d9cb03d688f5ba83f7fa87e1745c06a6d5f04
-
Filesize
324KB
MD5653cda08ee4f3a7f2977f438c0a40d30
SHA1ff626a7a33907c59b9b4c3afd0abb0390fe9ea0a
SHA256c27d085d883a0070cb857435a25116fa04436230ea3a5850789e75a39102a68a
SHA51201d915d0ba201d4732045fcd5c04c450345b580156705eadc26582172362f7f26d8faf36cd65eb7c9a63b80a5473bc822cafdfc7724c2168113ed3782b1ac3cf
-
Filesize
139KB
MD5401faa1b6df49fb2344c9e880b9bf87d
SHA1c58ebd0b1bde752ea558de174f70be91d73e08e2
SHA256bc486b8e22b86ca6ad0fad4f36ecb6918f6d700900dd930b2c901daac3a18869
SHA51268ba3733cff3ea402a6f7050c9bf788f8fc75b52e32841c969387d2dfc021322a7f03c3a7f2b9a6254c5a9b64810387b46c0cf99840c2d79a3b2082cf0e680ca
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD5155475717fd3655400bc98b0f03e5fa4
SHA1cfd6355f23fe5ba6f9ca4eecc29d164136c4861b
SHA256c9c1ffbb10a08cbc2071e6b41c7564ac975587e983eee81c8a7f86495e9b896e
SHA5125e0d13b68ff07aac18d7c9edfb9f650f86a60d7aaef5439cf590b3a175a43bc33bcf333fbb06aced512e09a4010d968ff66c5b1ed034d407e025a3371506557e
-
Filesize
685B
MD50a03e1917a38515ecb44033c43ab3775
SHA103fc0882b1a520dd13e2ce02487eee99ef805db9
SHA2566a41f2507f8323a8db3d973678ae008ab32eb66223528feed3a67405f1289f4b
SHA51237377e32251d0e7bf8aeccda179e2a9cfc3a4ecda3ca5a59230d0761efab972b581b35ea53ac16e917e8bc4cc24c4ee250575609f76ceea507963a484573ddcd
-
Filesize
361B
MD52a037df351ae7cdc041ca4c3ffd12bce
SHA1daf7043152f26dc175ef920f741e1d4ea8edc72a
SHA256050091df0eadb1b09d2d4cf76b51fdab0ef1c11a73a8e7ea826ec95c770f57c9
SHA512bd4b0605c6faebac7ada2ef29e7d849e3619f8d20296cca6f0178093095b943202f30f17faf3275e2d27da8f7a334c25f441f9846fd012a7cb1fe08bfe862d9f
-
Filesize
6KB
MD5d5338bf1919beeae9b471457ba7f53ed
SHA17372be89dba3a47fed5036dee2c02166bbc55c26
SHA2564cd848786cc2056093da977a2ed2f1cc4cace08640bb39d6ec20f9067492447a
SHA51242397a1ffd74ce19aa6e25ecadc15f9bf5d7666d40515e486c88e7caef9268d16a94d61070957ab19c1a798f14593009aa4d1ec01673e4979ec44cc22f91b178
-
Filesize
6KB
MD5955f76ba73dd610d1146d6e7ba235e66
SHA1b05100cc56133a8df86cdb73a21760cf1040676e
SHA256bbc0115594a623a9e735bac5575a7842bc5fee5837bcad33347e0dd1f0ebd8a0
SHA5120bf13ef9799174da123db35fe5ca7500c67eb8cd65ed915f8cba29927170eb8125a319dc9f606df3a971efa1c60845f4614905d539cc3404e7b7f02adfa4d623
-
Filesize
5KB
MD55ffe2c9d7c8ee151787208ea5da89626
SHA1446538d3892a86d8925c7679c71f207e977bc90d
SHA256103a1f8d1d445ddbf3bc8715e7d7aefd785164b1524db1c3e3491c1016d6a45d
SHA512cd0a6779149a3eae3fa410d52a3b42ff3597e119e4985eef3778f01c899408c1609b34cee5e9689d935ebf236cbf53611cc6f5be148d97192343c3aa08c4306e
-
Filesize
6KB
MD5c3cad9da24e3e6a6ca6b77279e9a0eed
SHA1ee8fdd783a71252571c4ee59722ccecf486fa75e
SHA2568eeea00cf007746c3ef4f3af5c2da9b593f67d70d1b20d6b171c7f8afde1d346
SHA5127b2182dbed87188f03dc069d201935e92e8b3bd5ae2cb05171f1ecf24b928131ce1f12fada922d64afb5a28a40d7f27c4d3420df8ae833979a2316f8bb562e7e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
265KB
MD58fea73194e1bdc46738107a8adf96f46
SHA1d2ade40b64c7be856daeb2eebef8cfef9189d7d7
SHA256569bbd3cc9fa9f606be37146394e573dc2f33085df394d2b2d41dc65fcad08fb
SHA512eab79b78778eda38f58a04986fddae7cb5088949c0477e398d470f1cf055a05227ef848d895e66dd80ff3ffdc2f6413771eb68ff3eb6eded90f3e25b81032084
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
5.3MB
MD5a2f58a117c60b1622eede88d2163ef19
SHA191ed6cf5b0efb2c0bd3e06ab5775775ccd1bd631
SHA256e74d896bc3469b5a28eb5a04ea364a9ab32737d573868fb08a327820ea624c04
SHA51219964984f66876032ef15283c25e31737e1f56c27a3f9d7fe204dccdc0a45c64e3380a5924f4b82301e55a5371bd7c9c61776e8ae6cb15a0e0502d189384c14f
-
Filesize
5.3MB
MD5e284a7bdf53b953d5514c6abe985ed60
SHA191655419b0e29b53bebbd102127056f396af6bb0
SHA256de29073ba5d2f701473a80f14c9dc35b2a11194918b8f682357b09d57c2aeb2e
SHA5122066d8dd92d2c64df6eae441fc25914a6214ff52ad264a38c156f59fd1587d6a7627f19a1b537fd82d95b7c66acaf73169b855df55fce0163bd3b05333377195