Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
suads.rbxl
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
suads.rbxl
Resource
win10v2004-20240709-en
General
-
Target
suads.rbxl
-
Size
1.4MB
-
MD5
14f036e2f461b2ded8e075d397183d0a
-
SHA1
30b2a73958a823d56c6533625cf7cbd507105ecf
-
SHA256
a7f2bb5c69d05ab5a79f1818958593afe3e3e0209c4ac7bd7034974d9cdf19c9
-
SHA512
bcbaaaf5f79942b09438b09a75de350f0669b2a774e122ecad7603b2827d069bcd163a1cbf50737ce67705afbaa9957b6ec086bf626c2ea026e6c47a59b36733
-
SSDEEP
24576:xf/Fr/bdYHDPnWD58/RUowbW9FU2iwLmqFw0P8UTwUsT:xlrRaMm9G2iw6qFXPG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2844 chrome.exe 2844 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe Token: SeShutdownPrivilege 2844 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3048 2356 cmd.exe 31 PID 2356 wrote to memory of 3048 2356 cmd.exe 31 PID 2356 wrote to memory of 3048 2356 cmd.exe 31 PID 2844 wrote to memory of 2708 2844 chrome.exe 34 PID 2844 wrote to memory of 2708 2844 chrome.exe 34 PID 2844 wrote to memory of 2708 2844 chrome.exe 34 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2600 2844 chrome.exe 36 PID 2844 wrote to memory of 2648 2844 chrome.exe 37 PID 2844 wrote to memory of 2648 2844 chrome.exe 37 PID 2844 wrote to memory of 2648 2844 chrome.exe 37 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38 PID 2844 wrote to memory of 2724 2844 chrome.exe 38
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suads.rbxl1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\suads.rbxl2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c59758,0x7fef6c59768,0x7fef6c597782⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:22⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:82⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2096 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2108 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1244 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3184 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:956
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fb07688,0x13fb07698,0x13fb076a83⤵PID:1940
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3708 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2460 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2228 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3304 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3680 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3808 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2216 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=696 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2268 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2800 --field-trial-handle=1212,i,15188112365801134677,11492260999284935767,131072 /prefetch:12⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e48b7c40c7d1d622ebe35f6ad9eb89
SHA1f9b99f31709c7f76132fc913ca5f0046c3dba6b4
SHA256d73bf2e9246c0f0ef0bd2c05adeca16a417b2de77f00d802a028debc55d457ee
SHA512a36945e456a76bb7c7f0f21beb81e0c617e4832344d64941ac9e1fd5db4b9901e735bff1733718fd7bc3b716ceaebf5f68befacde87b292440a101e443d40dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551075f7a0c8cfba3b416f2b262496dc2
SHA134ad12cae88275f60e200959cb17648e12f635c5
SHA256b2b6727e00aac15b5656a71921d0ceb1a9253ac608404ff3cc4ff493ba85d4e1
SHA51270b1cb0611da6ad5c809b84a54fc38376f0be114188eab638516d6b8af86dd477bc88d87c65c062ca98f62f9a47e2911cef224dda561f8d0e7c59511ee9ccb48
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
2KB
MD5009b036373140cdec4aa5d4df392d56d
SHA1d6d96d42fdb37b7c6afc0bba9e26b0a64751b56b
SHA25682be81855a8e500f63b6bea81d318180b121dea38289c9de10a6d747e84d95b3
SHA512801040c003eaf6c40c1be9e827d777a3e75ee0bd9b9c5eddd88b9d920859552e63d9124120a65c72493fb6eafa840550a98f57b9f174af6f836290c3a9ca9db8
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT~RFf77e32e.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD525988d42efcfef215a7b88a80fb1c66d
SHA1bb27dfebd46a50d62aecfa7616a7eea608a4b502
SHA2560bc42ee87ab57b108b8620ca8a7c4f5cda7cf702b09c355fbc2f4abf5168925c
SHA512405810d274fd1d7b30494e61e6ab3ec10531e36f6c98c075ae1b8e30b6363d56bfea0d90e4b7197fae068e889cebaef936f759050a573f2e47f0d073b6cc53ab
-
Filesize
3KB
MD559e01cee12341ca8be809908ad021fe9
SHA11c78d1d276e8f05598dfa37b74273a208c0f206a
SHA256dea8c8f0698f1b37f7cc9bc19466497e12393f927691f61f1912e6015b52d660
SHA5121fa66936fb52c0be088ae900d15b32c9b79384993de361dc91c7f9ca1c21c96d4c84207dd079596d7bb07995e008561b606e5973241caa6ad468fae68d87a389
-
Filesize
1KB
MD5b299977a64c3b0c5549a057c751e04d0
SHA1484dd7fed92ec08805ffb3ba3581e869bad941da
SHA2569ece50fb3c5e3154ec47e764ccdcba6dc89286bbe28dd159ba61dbd935674eba
SHA512c731a0b4299d0c77a538c5383155d958e2afcca41c1c9ea7424d63267e18fb4e9d9fe771bac44aa9d8eda78293c011894561221ddb5d8fa0347751fb8622ed47
-
Filesize
363B
MD5930cc76eb6960f0e6e20531a36bbd674
SHA1ae6482ba68b6df697da8e5325d2cfb73d6264047
SHA2566f6b1b4b1babc9beb4b3f978fc843a2dd053a9a91d595868ba934234703edf50
SHA512da0a58cc08255765e41cd7412444c4e4de4faacb7412b1414f438e8cefb6c3087e7459ff50c263e4e2a64ba15ca80206d2f9576bcc6429a0f1758befa440630a
-
Filesize
363B
MD5f898b7466b3ed40091ab322086fe2742
SHA1a41cc6275abae0981275a5289eabcbfed9540259
SHA2563fcc029bbc8d6320bf3550dd4598071026b262502b08e7f1c46edd378a6a033f
SHA51225338c3481dc779cca2ba9fdf15f8b2a0a5c858c522621bf47461bdca5eb0a7da8f49f025f9326a94c43dcf2c75927c99f609b7e79fb9ecd1d8865f730821d8a
-
Filesize
3KB
MD5c6ac8ec908ecb98f213d066e1568403e
SHA1435ced5e32ac1b873b2244f003ee98e88e868e7e
SHA256d0a2085d0ee594e87c863b3189eee5c7f5e43847647dd39835c7cb599db0a152
SHA5127a801bb69448bd89188da048344a9b5d506e4cafcf4fc0bab55c4508d5af370bf22d37067ae8497a2b93a354700b11b1ce914f224d7e961687f77f9e6486a154
-
Filesize
1KB
MD5460db521a6dd45cff1e3467dd7e21e32
SHA12342c977955aaf8be23eaede8fcd95b3249a4f2c
SHA256c9024235a00e986225964e992ab4d69a77bec09545bf29d4cb81620c4c8eb202
SHA512aff9bd13c48b500b1340f8e7a9cb802fa8bdcc297746e0f71306cbed4182b63f3c9f01cd69e4a81426b14fd309fee3edef01b87c948a9a50dc19eed1cd7bfb4c
-
Filesize
3KB
MD547be3233736538f823effc7471af0c10
SHA119f32f541f4d6726d88fdb747fbd5fce650c81e8
SHA2566203db348ab83bde3be637c3d3edb74e6ef3e01a0efd5687dfebbe094e3d3a22
SHA512cda5dee8e7403b5b9c7df204864d2168064d4b0f50e3084db411c8af74c97a12999f6b2481a1633daa54b495ea999ad05520d84ab6ab609f681b6b0150e02983
-
Filesize
6KB
MD56d05506b75c8f979587952eea74a5615
SHA1ca243f323e1f6740e6f65d28cf6e28d87a34dde7
SHA256f88c51006c8e5473b53d49e013f5bf3001bad4fd261581f3bc60cba42d8167ea
SHA512b1bda6ee588bd15469731a88616906948ba2ee11407a98b4f6f7a7159388487611b9120ae2edbf546559499aed6a4f5784c221b5e275c5ba675d1167e7a2e13b
-
Filesize
6KB
MD5356da587bb67c94f757cd45377bb4a28
SHA176291f42dfa34298ea150e9a61eed41d914ee7dd
SHA2560af1d8197decbc6cbc2ea444425d54573d6d9cbef3482c87bef431f14b1f387f
SHA512459ec8ca8d08cd524a79601dca19b3c6bfa263096c7eb2a5aaeb2e7c35dd0aa126302bcc33ee855a91826baed162548773478c32d819e0cbeb5295363768d43e
-
Filesize
5KB
MD509db56bbd851232e7b38d9a6e32a4dc3
SHA160fed0bab643d06143a2823028cb41ce39920e61
SHA25625013e42a6934c22eff0e6095e19bd1b8b84d68d7bade003f5e804d14250eeab
SHA512ee3c451c453be86a7f88d7e08e0527824f136e0860175d9d2dcae7652eb64bb5c013b44e72671a2b8063f8e75e72d1582d934702228dd14dfced2a6bfc47c13c
-
Filesize
6KB
MD54ca85eb1c6ac46805d91408f61c22691
SHA16a92f8ecdfe34fabb0b878d96b595350eb3bf010
SHA256b87592fe657dc3e14185b63fe4a3ee9afb071eeaad516aae4b57785e381bc7f6
SHA5123e2e9c599e94571addad06728cb4be969e3add8e14716a4f2cb9c417cf9c5d0cf61866abdf954364e669ec0d9a1fc55d2b5d80b555d636e4b3ed9ad54c8185bc
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
311KB
MD512a16027396076f5b29d948fa6c09fbf
SHA1afe8aa71a9591c2a849257b4125694430400ec33
SHA256a78ec51df56f6f0441f643d7ed711a7d909c121a33e3a96e271c7c9e44c8050a
SHA51209e0bcae5db49148d4e42e6a4eab0538ddcbf4562f12488134a5cb8f4f9f50c189254b527a459a016a13df340e2c89b54d544b64dcd8a7b00b9ec8498e6f6000
-
Filesize
311KB
MD50ceb1067508a0761463c13b8be347520
SHA1b94187b8e93d9f4382348fbab5ff8f10f1682922
SHA256e37f87623614eec45cf19c18192860b30a3a0fe8518e79da1fcb134a5c9783d8
SHA5127d33fec8e92997676219fe2f4e8826073a14108c0f2267745479ebf68e9ace4af7850515da3e4581f6868d14232b6f1b86bffe22ddc75a58b3f1be59c10ae192
-
Filesize
76KB
MD5567550069b41ce8e0e8e720ca876eaed
SHA158a674d52a05dbdad153de802875bdae6de03985
SHA256dcdca5aad22defb597cbc1b6c5d76791b6825ec6d50461ccf26cfa72945fe2bb
SHA512ec1f19459bd6a7dcb69815fd8216470ac0e7b3986102306a6d44371bd8c4f9f44e01070fa00bb040d6449acaec3cb50ea57a1518f9b30d104eb85a4ad9d83956
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b