Overview
overview
10Static
static
10BabylonRAT Builder.7z
windows7-x64
3BabylonRAT Builder.7z
windows10-2004-x64
3BuilderBab...AT.exe
windows7-x64
10BuilderBab...AT.exe
windows10-2004-x64
10BuilderBab...og.txt
windows7-x64
1BuilderBab...og.txt
windows10-2004-x64
1BuilderBab...ew.dll
windows7-x64
1BuilderBab...ew.dll
windows10-2004-x64
1BuilderBab...GI.dll
windows7-x64
1BuilderBab...GI.dll
windows10-2004-x64
1BuilderBab...D1.dll
windows7-x64
1BuilderBab...D1.dll
windows10-2004-x64
1BuilderBab...10.dll
windows7-x64
1BuilderBab...10.dll
windows10-2004-x64
1BuilderBab...DX.dll
windows7-x64
1BuilderBab...DX.dll
windows10-2004-x64
1BuilderBab...me.dll
windows7-x64
1BuilderBab...me.dll
windows10-2004-x64
1Analysis
-
max time kernel
376s -
max time network
374s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 01:20
Behavioral task
behavioral1
Sample
BabylonRAT Builder.7z
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
BabylonRAT Builder.7z
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
BuilderBabylonRAT/Babylon RAT/Babylon RAT.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
BuilderBabylonRAT/Babylon RAT/Babylon RAT.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
BuilderBabylonRAT/Babylon RAT/Changelog.txt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
BuilderBabylonRAT/Babylon RAT/Changelog.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
BuilderBabylonRAT/Babylon RAT/ObjectListView.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
BuilderBabylonRAT/Babylon RAT/ObjectListView.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.DXGI.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.DXGI.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.Direct2D1.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.Direct2D1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.Direct3D10.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.Direct3D10.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
BuilderBabylonRAT/Babylon RAT/SharpDX.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
BuilderBabylonRAT/Babylon RAT/Theme.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
BuilderBabylonRAT/Babylon RAT/Theme.dll
Resource
win10v2004-20240611-en
General
-
Target
BuilderBabylonRAT/Babylon RAT/Babylon RAT.exe
-
Size
6.7MB
-
MD5
aecdce1d7e2a637d1dcacd2b4580487b
-
SHA1
d5cd12f7a18d6777c9ec8458694aa3a74fd23701
-
SHA256
9157a48c53ca7a4543bac5b771886c87ea407bab6bbb053b50bc22709111d572
-
SHA512
8bb5ad64f1b2e75e47c4671396a713018c74c44e84803887c6b4a200ea85f4c020ccfe15211af3899cdcf9d0f46ef994bfd939e462f61062044874f7a64d7a35
-
SSDEEP
98304:KbldsCQTcsBL54TRRTk3w0ZIWoPzSSosDlh7OLifNLxu2UVaCS2e7Csb6j9cgl36:GnPsHqRwvoPzSSosDlhCKzi9/2BO4T
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 88 discord.com 89 discord.com 90 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643571682244455" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 Babylon RAT.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2744 Babylon RAT.exe 2744 Babylon RAT.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2744 Babylon RAT.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3012 2452 chrome.exe 112 PID 2452 wrote to memory of 3012 2452 chrome.exe 112 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3480 2452 chrome.exe 113 PID 2452 wrote to memory of 3648 2452 chrome.exe 114 PID 2452 wrote to memory of 3648 2452 chrome.exe 114 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115 PID 2452 wrote to memory of 5000 2452 chrome.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\BuilderBabylonRAT\Babylon RAT\Babylon RAT.exe"C:\Users\Admin\AppData\Local\Temp\BuilderBabylonRAT\Babylon RAT\Babylon RAT.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffac701ab58,0x7ffac701ab68,0x7ffac701ab782⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:22⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3908 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4464 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4484 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5100 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5312 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:12⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5484 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5564 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5732 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5864 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5ccb536a8bf8b76c8d17d2e5defaca6c5
SHA1704914cabe15dd86b08813443d8fcabc188ed651
SHA25677adc5c2a7c86d5de61cfb3a1c546f74ee27e6b7cb619ff54d3813377d193e0e
SHA512c11a6400c4f877088473b4002237ed4a44c3e8e4631f91255f0c02854e0e902ce12c7e64f273a06838bd96a639d56cd70dec55e172d43e59b8c1f2d764735c2d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD54fe170397f2c6449944ccc1492905246
SHA17e4f01db1985ff5779b9ecfbf398927eb56592b4
SHA256a1ae94bbcb5ec9c4f3b4a931d37735d6758a6f0d4e4a8695f4f8c91cb2449059
SHA512eb21f69804b740219ce897ca705acc7ef95a2144ef85b064c0d66a2971e91468dd2eee4db046b9c69f37adf7778439d2447de4f946940bf75f4b32a9fded96d5
-
Filesize
523B
MD55227e4e2490b7b0f0c7cd05457e36d57
SHA1da3bb32e547d1bb79d4471d37a56a2251b02d706
SHA2562c7f4eb9246b176e80a7416827fb7a4e4c83448726543796ff9d60c903d93a66
SHA512137e39aff163885b433f99460caf8ed10ac9d5ada1bba8b0d158301b5fbc9bca481920d5855f44f0827a1927e4bb5ac5991aff0a42a936bfb3c8ede8ce1b807e
-
Filesize
7KB
MD5fc2740ad7401cb3bd9fd46bd736603c7
SHA153a331a5bf5fa520f3470d3adaf715d885aa5273
SHA25610135914687c1a86b96d294d1c85c9859f1c99f21b1a2294350f4558a470936b
SHA512b6846ba4b89ad03954937548806ccb88fba2e220e82de1d2a04dcfd718ac5ee391a79d0170d0b480daf617067f4f80cea61443312e3ddfd8df2c1f328cd5d7aa
-
Filesize
6KB
MD5b5e6c6d9df69a199b8ad85c6b82e3382
SHA1ef1ff46e5818797ac937953c21153c9eab708e64
SHA2568877aa87032463a563b7c516b842c684619f75ef7ab34d1d6fd8c5434a99139d
SHA5120510cefc900de66850b39d30d2e6a93f09ccb3a7e70dbfd1389ea88dd9d4615df108845c0ab1438050e899429c394631910b95442f842449d2321680902b2830
-
Filesize
278KB
MD58e35d9021805cacb0e7aa97262d02117
SHA122a2d5f894790f937f02def7e8ddd7b0d14e7cb3
SHA2568f5020650f140efb14f01330ed57b394d243fe345c260dceaf5b120890bf4868
SHA512132e8cbf04f3868bb8734016f8efda7907020210c2ec850d37528b29712034b7484178057ec323710f5c1cd3f6f85a2030d110aebc9f006300f2c64ab30cf590
-
Filesize
278KB
MD5988295f0d62ed46c02446823c78556aa
SHA160b24608dfa077c85dd3caf5720bcfa37a3b6cdc
SHA256313f94080a7f380a34641beed38c215998c8690fa692fb20290fef0283f311c7
SHA5120a1015caa1784f7b9566d07ee6cb2f550819b5b199a5c85fa28efc8b4521832cd3aa81f7d8694b4d042b416ca24e1a79953c888c4b7ec4df7479803d8ca0e612