Overview
overview
8Static
static
8Blank-Grab...er.bat
windows7-x64
1Blank-Grab...er.bat
windows10-2004-x64
1Blank-Grab...OBF.py
windows7-x64
3Blank-Grab...OBF.py
windows10-2004-x64
3Blank-Grab...10.pyc
windows7-x64
3Blank-Grab...10.pyc
windows10-2004-x64
3Blank-Grab...10.pyc
windows7-x64
3Blank-Grab...10.pyc
windows10-2004-x64
3Blank-Grab...10.pyc
windows7-x64
3Blank-Grab...10.pyc
windows10-2004-x64
3Blank-Grab...der.py
windows7-x64
3Blank-Grab...der.py
windows10-2004-x64
3Blank-Grab...ess.py
windows7-x64
3Blank-Grab...ess.py
windows10-2004-x64
3Blank-Grab...ess.py
windows7-x64
3Blank-Grab...ess.py
windows10-2004-x64
3Blank-Grab...ar.exe
windows7-x64
3Blank-Grab...ar.exe
windows10-2004-x64
3Blank-Grab...un.bat
windows7-x64
1Blank-Grab...un.bat
windows10-2004-x64
1Blank-Grab...ief.py
ubuntu-18.04-amd64
1Blank-Grab...ief.py
debian-9-armhf
1Blank-Grab...ief.py
debian-9-mips
1Blank-Grab...ief.py
debian-9-mipsel
1Blank-Grab...tub.py
windows7-x64
3Blank-Grab...tub.py
windows10-2004-x64
3Blank-Grab...px.exe
windows7-x64
7Blank-Grab...px.exe
windows10-2004-x64
7Blank-Grab...tes.py
windows7-x64
3Blank-Grab...tes.py
windows10-2004-x64
3Blank-Grab...gui.py
windows7-x64
3Blank-Grab...gui.py
windows10-2004-x64
3Resubmissions
13-07-2024 23:11
240713-26p46asgld 813-07-2024 20:33
240713-zb9h7swdpk 811-07-2024 21:44
240711-1lnj6axfpd 811-07-2024 21:32
240711-1d16aaxcrf 811-07-2024 21:29
240711-1b5qpaxcke 811-07-2024 21:25
240711-z9kmqsvcnm 811-07-2024 21:22
240711-z7xvaavbrp 811-07-2024 21:20
240711-z6q1cavbmj 811-07-2024 21:16
240711-z4v7aawhrd 8Analysis
-
max time kernel
189s -
max time network
538s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 21:22
Behavioral task
behavioral1
Sample
Blank-Grabber-main/Blank Grabber/Builder.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Blank-Grabber-main/Blank Grabber/Builder.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Blank-Grabber-main/Blank Grabber/Components/BlankOBF.py
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Blank-Grabber-main/Blank Grabber/Components/BlankOBF.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Blank-Grabber-main/Blank Grabber/Components/__pycache__/BlankOBF.cpython-310.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Blank-Grabber-main/Blank Grabber/Components/__pycache__/BlankOBF.cpython-310.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Blank-Grabber-main/Blank Grabber/Components/__pycache__/process.cpython-310.pyc
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Blank-Grabber-main/Blank Grabber/Components/__pycache__/process.cpython-310.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Blank-Grabber-main/Blank Grabber/Components/__pycache__/sigthief.cpython-310.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Blank-Grabber-main/Blank Grabber/Components/__pycache__/sigthief.cpython-310.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Blank-Grabber-main/Blank Grabber/Components/loader.py
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Blank-Grabber-main/Blank Grabber/Components/loader.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Blank-Grabber-main/Blank Grabber/Components/postprocess.py
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Blank-Grabber-main/Blank Grabber/Components/postprocess.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Blank-Grabber-main/Blank Grabber/Components/process.py
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Blank-Grabber-main/Blank Grabber/Components/process.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Blank-Grabber-main/Blank Grabber/Components/rar.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Blank-Grabber-main/Blank Grabber/Components/rar.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Blank-Grabber-main/Blank Grabber/Components/run.bat
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Blank-Grabber-main/Blank Grabber/Components/run.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral22
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral23
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral24
Sample
Blank-Grabber-main/Blank Grabber/Components/sigthief.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral25
Sample
Blank-Grabber-main/Blank Grabber/Components/stub.py
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Blank-Grabber-main/Blank Grabber/Components/stub.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Blank-Grabber-main/Blank Grabber/Components/upx.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Blank-Grabber-main/Blank Grabber/Components/upx.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
Blank-Grabber-main/Blank Grabber/Extras/unblock_sites.py
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Blank-Grabber-main/Blank Grabber/Extras/unblock_sites.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Blank-Grabber-main/Blank Grabber/gui.py
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Blank-Grabber-main/Blank Grabber/gui.py
Resource
win10v2004-20240709-en
General
-
Target
Blank-Grabber-main/Blank Grabber/Builder.bat
-
Size
1KB
-
MD5
69f3538d09da509b93329b22fd59a956
-
SHA1
d74ccc96102895e111712beedabcdc725fb23360
-
SHA256
79e1377ac17e6aece067d4cf6a202d8baf43a9906cea353de7188c43b20500c8
-
SHA512
a5e2fdeb2d185acda43e6a0d964966fc5246d2fe598d094e0b59bd757c42170d3e4125cf7da736080a95141b453d12a53af295eb53bd64e431285e8213da9b07
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2196 2460 chrome.exe 33 PID 2460 wrote to memory of 2196 2460 chrome.exe 33 PID 2460 wrote to memory of 2196 2460 chrome.exe 33 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2772 2460 chrome.exe 35 PID 2460 wrote to memory of 2232 2460 chrome.exe 36 PID 2460 wrote to memory of 2232 2460 chrome.exe 36 PID 2460 wrote to memory of 2232 2460 chrome.exe 36 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37 PID 2460 wrote to memory of 1028 2460 chrome.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\Builder.bat"1⤵PID:2536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b49758,0x7fef6b49768,0x7fef6b497782⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:22⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2336 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2352 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1496 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:22⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3732 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1092 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3636 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2552 --field-trial-handle=1196,i,17614858944684918577,4736433073672975750,131072 /prefetch:12⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
280B
MD5adba52f2bf1b13e61a6b9e05727507bf
SHA1816d005750d146c04181e4df37a69ed9b7de264f
SHA25636ab78a4d937aa01ab1b87eb32477f2bb7814bb448a1acb355394e6f00556771
SHA51297dd59a020be0048fcdbabc2153d4762083ada29f69f852760e1e76af8dcb50fa2380713408f2e41558d1b980ddbbe6ec51e3cbfe7c58f90b3793f95ffecab1c
-
Filesize
19KB
MD504eafe455471da4d7ab988fd05b213d1
SHA12be2117e46b4b18aec83f5d8ffb3c6053e8eae3b
SHA2561a29d24bc81e621e29525593fb94d5a99dccb95a89a1f2230c1aaeab7a576ee5
SHA5123735fc20a8255861586c81d987d9e2fb287650015c4d40c912ba9e6da32b6b8ef2e6e86a478630f3cbb7d3a732c0e2580f89fe4d368adfb19cd97df28293fdaf
-
Filesize
168B
MD522bcc11f8493fa7cbc6250790ef75e64
SHA1e3a6e1ab2ab0c7116eb42e5e934976d0b78a3583
SHA2565cc1ff10abd67e4ed21f6519a9c5d7b72f5a8ca406f50f2130f793c6466fe4d8
SHA51273223418c1065130e036a073fff3374c1b3f6056e513d376ad09f3e87e36518d7314dd8716c28df106cfef00d8811500383841e0d049bd7aaf60ce20f57d7df6
-
Filesize
168B
MD520df3652f2a80143139a2269d2a3a548
SHA1a7cebac86c7f4de56ed2a6f29a8d281ffd10a7cb
SHA256ddf9a5f62b3eb7cef72a37ec4f9f10c2378db1ec812c36d861396b557ac52359
SHA51283904bcb4e3f23d73d4f1c8b7d0e5dc3e910e83fdc5c2804e6981ba1e379a9f3237de15ac138aa13b8f8c5ab3b6f0994d958e7a7204b2360e317bbb0c9e9023b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD545e297f98b7fb3b20d7eac159e584e62
SHA19b48c7869261b13ca8e6275f9723d22204562498
SHA256b1f105e9cd4e76cab1f0b37d75a3d0476d2e5bb9bc88e3e603bba1318e17005d
SHA512503368acaebb7322668ed64a1687278c5cca549a3bb0663ac9b068007b294e8bc1b2eb5e2f59900041a18c37232a251746af11aab9f37cae5122b9da50ed8eba
-
Filesize
1KB
MD565d0bdadc2351e6e622e674e1d649644
SHA14d565e51ee1380334a48b565440f79d81a4f6603
SHA2567db5497b1f4dde98b5966f92a30b6ac128d53d98f32b2ebee868fd34e2e6d304
SHA512a92ee1964806a42452c1ffd691f7e7f96636137f4dec10d9af9c65c7bdeba5c1176507d3b1b69ca9b581086b98449ba15d23cb976b214b41acebc6c1986e9469
-
Filesize
1KB
MD51380cb9132639fa63abbbd24bef05a15
SHA1368bb2a057a1c39d1dcf64d324267e49d7cfaa27
SHA2560664f9320925f4526f68fdaf123183169ce4ebfbe702c90860b6b7af0623a4cc
SHA51252cedb9b3d652815970efbf07892e703102688ce521886ef0ccf7628fc096b24d7f9de43f1e5ba83e9c79b7ea5cc51b892a3c1ea267363fe50386d80df79e6df
-
Filesize
363B
MD5c9dc3887a21fb24db8c1b263a4d5d746
SHA1f76fdb75b52f84863d19421a71bcaf331f73b228
SHA256ee8a971931a830dff47bab64aae0cbb07a26a664aa96e60cf60a8222f8d2dbbd
SHA5120446fa91ae3979d3d4a249feb7136a5e8b1a9b4795f92821e999386aaca7732f4450b2d73630f54f866e466fa0137fea53c53ee1887d2f6b8a74eeae2d41b702
-
Filesize
5KB
MD5264c219167655b9c02441ff58ef6d9b4
SHA1f201bcd7e23576371311127e42b6df64affb5bbd
SHA256a615db28dc8ff528b97db060f3520f3a9f73b0ef37121f4045f97ea3602f06c0
SHA512c6b7268dcd7ac5fb96fae6ca1b74601aa691910f01869d6c99b6306d254f5c98828de275ba9b9fd15eb129d0c2c3c5af9fcc564cdbacde64ec8237203712d578
-
Filesize
5KB
MD5c7891db1e7b78f67451c2c4cb9018ef2
SHA19e52394a5d6145c01e3a6e8349ad064b1e28e4cd
SHA256ee2a98fa1ca10301d7ff004a2c07c5d31623a78b2e0285a67e9b3d40ef9a7205
SHA512c386efb915d3cfd2a58c4b93e20e433b567eb5da7b1c495f27db7de88559865a8c38528978d615449465b18659f0d7e171eea288f3892d608e50d71dbd7c57f2
-
Filesize
6KB
MD59d61f4b454668cfcac656b7511ed39d3
SHA1f78e2d743364ffd09086f7009d38f64db24b9eef
SHA25649667e741f025d425de186bfbcaa3c240ace4e8f6ebde77b93f6459a5e27efa5
SHA51220c0ebe263a0ebf13ddf8d4b269f6d929af0c9a0f086ee6155554e76f0a85fa274ed2720104a957075a3d1dccc50b63e3b6ac1cb5c733679e58875849fb70a79
-
Filesize
5KB
MD541b4af08e63bd1ef3574c9cc41b3dec7
SHA115a74108e6a1ebac025a4c79ddc1e895908bec1b
SHA2567919420d81720c3fd47ad5dc28e16faae60cecee49c5fdd731d14565ee61d982
SHA5122e2988c430f79669e3da34155573c669ad0b45fbc8eb1a9a3f503aa4c576d4d078d0f562f3729f9803b9301250bcd7a9df075e4969341035e474ba6d77378328
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
304KB
MD53547d11cb24fe7687b91a4ac4c63674d
SHA1a116319ec724ab734177c8ee09cd12ed797a23e8
SHA256f8f84fb6b4ff2120d096a9f991cf8580bd5dd8e113cd8de24cbd19b85ff4d647
SHA5122bec929557014b177f9ea059f3504a75c77747dfbd88999d5d044c71fcbfa8fa4a1b2e44dd8390fb9366cc0e0e2062569ee74f2071e018e12829d029da8708a9