Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
8PySilon-ma...nux.sh
ubuntu-18.04-amd64
1PySilon-ma...nux.sh
debian-9-armhf
1PySilon-ma...nux.sh
debian-9-mips
PySilon-ma...nux.sh
debian-9-mipsel
PySilon-ma...on.bat
windows7-x64
1PySilon-ma...on.bat
windows10-2004-x64
1PySilon-ma...der.py
windows7-x64
3PySilon-ma...der.py
windows10-2004-x64
3PySilon-ma...ler.py
windows7-x64
3PySilon-ma...ler.py
windows10-2004-x64
3PySilon-ma...ber.py
windows7-x64
3PySilon-ma...ber.py
windows10-2004-x64
3PySilon-ma...ies.py
windows7-x64
3PySilon-ma...ies.py
windows10-2004-x64
3PySilon-ma...64.dll
windows7-x64
6PySilon-ma...64.dll
windows10-2004-x64
1PySilon-ma...isc.py
windows7-x64
3PySilon-ma...isc.py
windows10-2004-x64
3PySilon-ma...ber.py
windows7-x64
3PySilon-ma...ber.py
windows10-2004-x64
3PySilon-ma...ons.py
windows7-x64
3PySilon-ma...ons.py
windows10-2004-x64
3PySilon-ma...rol.py
windows7-x64
3PySilon-ma...rol.py
windows10-2004-x64
3PySilon-ma...put.py
windows7-x64
3PySilon-ma...put.py
windows10-2004-x64
3PySilon-ma...sod.py
windows7-x64
3PySilon-ma...sod.py
windows10-2004-x64
3PySilon-ma...per.py
windows7-x64
3PySilon-ma...per.py
windows10-2004-x64
3PySilon-ma...ing.py
windows7-x64
3PySilon-ma...ing.py
windows10-2004-x64
3Resubmissions
10/06/2024, 13:26
240610-qpxbcsxbra 810/06/2024, 13:22
240610-qmq2kaxfll 810/06/2024, 13:16
240610-qh9m4swhle 8Analysis
-
max time kernel
130s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 13:16
Behavioral task
behavioral1
Sample
PySilon-malware-main/PySilon-linux.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
PySilon-malware-main/PySilon-linux.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
PySilon-malware-main/PySilon-linux.sh
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
PySilon-malware-main/PySilon-linux.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
PySilon-malware-main/PySilon.bat
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
PySilon-malware-main/PySilon.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
PySilon-malware-main/builder.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PySilon-malware-main/builder.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
PySilon-malware-main/compiler.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
PySilon-malware-main/compiler.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
PySilon-malware-main/resources/discord_token_grabber.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
PySilon-malware-main/resources/discord_token_grabber.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
PySilon-malware-main/resources/get_cookies.py
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
PySilon-malware-main/resources/get_cookies.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
PySilon-malware-main/resources/libopus-0.x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
PySilon-malware-main/resources/libopus-0.x64.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PySilon-malware-main/resources/misc.py
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
PySilon-malware-main/resources/misc.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
PySilon-malware-main/resources/passwords_grabber.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
PySilon-malware-main/resources/passwords_grabber.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
PySilon-malware-main/resources/protections.py
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
PySilon-malware-main/resources/protections.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
PySilon-malware-main/resources/source_code/audio_control.py
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
PySilon-malware-main/resources/source_code/audio_control.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
PySilon-malware-main/resources/source_code/block_input.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
PySilon-malware-main/resources/source_code/block_input.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
PySilon-malware-main/resources/source_code/bsod.py
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
PySilon-malware-main/resources/source_code/bsod.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
PySilon-malware-main/resources/source_code/crypto_clipper.py
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
PySilon-malware-main/resources/source_code/crypto_clipper.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
PySilon-malware-main/resources/source_code/file_downloading.py
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
PySilon-malware-main/resources/source_code/file_downloading.py
Resource
win10v2004-20240426-en
General
-
Target
PySilon-malware-main/resources/libopus-0.x64.dll
-
Size
431KB
-
MD5
0e078e75ab375a38f99245b3fefa384a
-
SHA1
b4c2fda3d4d72c3e3294beb8aa164887637ca22a
-
SHA256
c84da836e8d92421ac305842cfe5a724898ed09d340d46b129e210bdc9448131
-
SHA512
fa838dab0a8a07ee7c370dd617073a5f795838c3518a6f79ee17d5ebc48b78cebd680e9c8cbe54f912ceb0ae6112147fb40182bcfdcc194b73aa6bab21427bfd
-
SSDEEP
6144:QzvQP4JEH+xiPuym+Sl1AhOtw6qIUZtvJd3dbK2lbO2miHWQAD03N3hg9/To88jC:Q6Ho+8p0IU3BW2s2miwmOLozjJ
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 65 camo.githubusercontent.com 69 camo.githubusercontent.com 172 camo.githubusercontent.com 173 camo.githubusercontent.com 174 camo.githubusercontent.com 68 camo.githubusercontent.com 70 camo.githubusercontent.com 71 camo.githubusercontent.com 171 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2980 2888 chrome.exe 31 PID 2888 wrote to memory of 2980 2888 chrome.exe 31 PID 2888 wrote to memory of 2980 2888 chrome.exe 31 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2860 2888 chrome.exe 33 PID 2888 wrote to memory of 2808 2888 chrome.exe 34 PID 2888 wrote to memory of 2808 2888 chrome.exe 34 PID 2888 wrote to memory of 2808 2888 chrome.exe 34 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35 PID 2888 wrote to memory of 268 2888 chrome.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\PySilon-malware-main\resources\libopus-0.x64.dll,#11⤵PID:2528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bd9758,0x7fef6bd9768,0x7fef6bd97782⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:22⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2668 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1308 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3448 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3688 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3416 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3684 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2456
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f517688,0x13f517698,0x13f5176a83⤵PID:912
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3576 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2288 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3788 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2220 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3820 --field-trial-handle=1384,i,9814842961657138526,9331007383039009358,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515249546e060e28074d529a93bd8aff
SHA1c39317fe1c4c24d1354935ca961cd38cd5dd94d2
SHA2566c63b6ebd7ad56e84aee77dca77fa36bb15dbd6559c340c09414e3b3c2f3512d
SHA512a08fe1f4a2e46b95233fe49fdffda708532c4c82ed3147790413b0f99056b96fbdb9fb64669f4e5e13c0b053b98238e15afd95806c275d71afe59f2044523002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12506b1478d3c92cd51ec42ffb7857a
SHA11e6bb3e6e3fdb8d82d24df8d5d958c63499bc045
SHA256469e57d0288149eda22e4ee91cf8a575f9092b453c289db20e799215bce43dd4
SHA5126eb1d59445a029a0714bbcce679595e71fccb3cb92c42cce4e0a5243b127e7909d143d3f59f59ee6e030a8979fadff23c65542fb2195f382661575dc2f7ae362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c70615bb0929beb32b56d1dc7bde06
SHA19a93723fe970f1e544b330d7ea8de168fb258ff0
SHA25624f5d7902aad033ac538a8699c2630446455a693a185e4d26a1e82be4164da51
SHA5124827103a28a495ae5c82bb56da692733ad54738420b2d99e517948dc0bf4be15dfd684a1bbf47806752eb63487f13c98c87f00d21f9ec8b75b6e03897e606cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bad7be4972739ac177bcce11661cd71
SHA1b5e1b1726978203dd79e6d9a3618159f2713f9f8
SHA25617f8c397a89a7eb08af886a4a34f2ab96529151d1fb08fb3eb7e47c16c0452d2
SHA5123490d746bf1c731b0b7c5b6a624cfeb0c36fde79e418fc103463f201fafbf3754d4f7b63812eaf681fb75d4bc6a35921d8fe82d1ab5953f5f8fc19a315040a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81a267df816e2062de3ccd82b6f6a4d
SHA13f8ac5b16615bc2c573967fcd8fe82abf57b6849
SHA2560bb7aa8b6653ab1692ee8ade2a2e2f9225289b650e33bf440b337dba01641084
SHA5121d22c99b4b06f1a0934cbb6ca15810c2bd3d963bdedf5c23fcfa61409cb6d9a8d6d53a82547e777866c7d649629c385730d3b1dee358dfbbcdc119093f47e1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0621d69a5ef3cb1ab1d5e5449fc6b6
SHA1702a89f5026e572370ca1ca6ccfc9aaf899f7991
SHA256a2bc503e5f0b3a931f878b49f9805e6eb62b30e2612b2ba4d8581560ec2eeab2
SHA512e091ee8ef745dc32dfc386f6d017f03d1f1074864365ee352ee52dc42a3f6a61fc1a4027dd6b8d89cdb37e143b514960c047a6835ec7806e9d8e91b8acca75a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f993e8a32624829140a4adad51b76e
SHA15efb6a49f50f3744e293f71debabec7fff4240a1
SHA256cb8b11c193315bc3709e629daf7bcecc630fd0ef63605b8743baae4cc61a1a62
SHA51224bec38fad0d12ec847ce490a2ee990dcc2aa02658c6ddb6fb19ccc6584517ba9ff95fb6b3c14ae74262acc6b842aefad0cd4ebc28f7e0dc2a8dfd41e3cec2d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\118b5801-3b2b-46ce-ade8-fd270e7c49eb.tmp
Filesize6KB
MD53a99248c65a494d3fd87327aa682bc33
SHA123248a77a5c042e10cbdcdf51282c54ddf89579d
SHA256514014806d88a7bbfbf08018f3bffeed8e0eb8b84a8e752583082b719e5b7707
SHA5122d60521f4e8cf0f95b09f6a72319b33a48c90b92bd8765e874e21c2cc11e5a65d9be2be7660b495f0f4e173f826fab5cfd53d8693ce3b0946cf6ca00290d357b
-
Filesize
456B
MD523a928d6ae9142be40658b3573e73ac8
SHA18d5939c1176368156a7f48aa2c3c67c121c1887e
SHA256b5030a4e1a3de4039e596d75538f62bf87a27a84654a0173bb71a80d2aa130d3
SHA512118de43dfc53ef406dc0f96a4d7d3cebb00b7963952ca83fa37b8787b3b396cf7d228a80c89febcc426eb81ce07abe5d8c9e4c02866d856b7141f4ea72a707c2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5f5abf5c558006540cb09e618a1c52a66
SHA1cff6d8d139b677d1be575814790787d0d606aacd
SHA25685a16a29cf48dcea78c9f8596a2b03aa81b8dd3fb6ce6127ee5ffcbd25c68377
SHA512b0eb4c4501dba1634e5dd9ecea1e606f520fb3035e51360015272e2dbf0746735b9fe739bf304f88c79daff35cf2101d73d264d434b6da0d665b6d4602ec4c4c
-
Filesize
689B
MD59850c8bef80de068b5cc85a71ec8b278
SHA10246035f1c5a708ad8e6fef10e1b7a449e9eb77f
SHA2568630d77b763eca53048ccd6226afe1896955c5fce96df34300253a20b7eac106
SHA512d406cdb849cec78ad896b749115eb62f3140c00a78c1aaf9f314ad627121a05d4814999ab4f1141dfd7a104553bc5a39690b254436a9d2df7ac928c4253f4c25
-
Filesize
5KB
MD5d1082b60df274dcd36df05ccc56e8d9c
SHA14d8615f2c212c7a69290603f7b197a9b6d8419c0
SHA256be6ada4883675a5b67df67dc18d206edb8d04e3f164e824d03a851be00d94a67
SHA512f3cf2d8695cddfd53bf5c1675630aa8dbf8abc953197598c4e5126fbccf28f8a6f81e59d5e29439d51684b58afc6b47fb94b713e6a031b69efd358e7034c1f44
-
Filesize
6KB
MD5292c3dc47c813af8179593a35e194dc0
SHA19eb732a33b6388bea330b6a6fdfa216125bac54a
SHA2568b3b73b165d9384bb0506a8377e9018e5322770b56d2810da2bdb58143dc2341
SHA51294649377cdcd92aea1256b07d1f6066a3522262b7e6a85051deac60b998f489878739f05e93ec4803845f3339dabfb9ee85c4a2fcf55fdd5df6a0c7727c94b41
-
Filesize
6KB
MD596ba8ef9777aa1010bdbd67665a663c1
SHA136bc98b52ca6f9d8eee8e0562103e971e2717e38
SHA256e697ee188a76cd720037f8d77229b7ee7eee94eff86f840ef1f56bde3a70fe1e
SHA5127773909a6524774042f620dae3b1ee4d1991f1aa57373f12b4a7b641240a9efacf7b4f98964689b46345b70ad10fde11d9a2d22f5c0345670490c780438cffd0
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b