Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
full-bypass-celery-roblox.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
full-bypass-celery-roblox.html
Resource
win10v2004-20240802-en
General
-
Target
full-bypass-celery-roblox.html
-
Size
4KB
-
MD5
8a9a19b578df804bd90d6ad9de2213b1
-
SHA1
e65ec9bc72fa82e48ef1f92a6f7481d5dd2dd9a1
-
SHA256
02aafec282e6c489fb5dc3e41ad9ca4217b3bbc5661be42e7488d87d416285a0
-
SHA512
9c85cf609518034235c7b15808548a01cb2899b4acacf6ec232c9ca46c1bf8158ae292300b205ffca9de83eb02db30170f7519aac13fbc91b02c24edc2f9636f
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8/ZqXKHvpIkdN5rRU9PaQxJbGD:1j9jhjYj9K/Vo+n8aHvFdN5ry9ieJGD
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133691328960593952" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 4692 msedge.exe 4692 msedge.exe 2120 identity_helper.exe 2120 identity_helper.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 2380 4692 msedge.exe 86 PID 4692 wrote to memory of 2380 4692 msedge.exe 86 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 2988 4692 msedge.exe 87 PID 4692 wrote to memory of 3896 4692 msedge.exe 88 PID 4692 wrote to memory of 3896 4692 msedge.exe 88 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89 PID 4692 wrote to memory of 2924 4692 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\full-bypass-celery-roblox.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9b7b46f8,0x7ffa9b7b4708,0x7ffa9b7b47182⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1976,16173803180896727420,16520204259641216368,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffa8d00cc40,0x7ffa8d00cc4c,0x7ffa8d00cc582⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2036,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1848,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2324,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1732 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3732,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:3632 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff79a314698,0x7ff79a3146a4,0x7ff79a3146b03⤵
- Drops file in Program Files directory
PID:904
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4796,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4400 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5152,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3376,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5044,i,11215716465407308489,11960712577120014771,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\34b9ca73-b1f2-428a-a262-5d561e5547f0.tmp
Filesize9KB
MD523ec06841206c7e02db5917da0975ef6
SHA109e3a069f848d617f53cc0693364e5b98f162cd3
SHA25661884b74defcd16824c8932b5e84abec38d86db2a4ae1b19f0a0d0d4bc5d8256
SHA51280ad43729cb9de3b711b5e06b8f354b0aaf278e6fd215b8d505afb72deef124e313db1806a86a60394193873ca8d8b7ff422dca05128c99de5f8d84591fda1ca
-
Filesize
649B
MD5a1f01fdfb3470ce7925b623939904d40
SHA136f92502fea53352f79182100bc48cdef010e429
SHA25666c5790bd1a18eb65304f31817cf1577486b9153718e31fd31e9d40bb09e116c
SHA512150282f63b0610c686b696339dce2abb5b338bbaa3d245451c83fbf00b3ae56dbffd3f0ea80dfb216d2256394320c32efcba9ed0e9a54143751e6264358f15ec
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
Filesize
216B
MD5fc3f4bdc7ca6e1575e54ffbf2e27d12d
SHA1f9cd68066f9037cfdf1a52f3a7afafc804274f25
SHA25639886a77ecb9bba580eafed334e38a4d812e6e43238ee8250e7bbbc42328f56c
SHA5123a552797b39c52837f467f346eff9f1a144f1f67767a64dcf214c7bedcd35a84fe51b978093ed41aee9d26347dde8677b0da5f7e811fcd6ee427eaaf1e0f0589
-
Filesize
2KB
MD5e6af67cf03cf1e071518403d9e8da1ee
SHA141ce7850fe89c469cb3f9aef2bc3a33a527a90ab
SHA2564d529081fdce76484bf979824fff026dc7fc3f9fff2c7c3152043ee7b5f27546
SHA51244d8a8c33c399d5f813775037c32b23b5acf460436cef3f371000bc398daa1f11939059ce1f581323b6a0553ebc6f3db79822e6510013f1f7ac357b00b4581a4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD57e971cfca4da1e5c54cfd3eda74ca9f7
SHA10c06543025c24aa09106454336af53afbfc09a4c
SHA256e9629fad92396f8d2cf295dd5c33d429189dd7b6cb4cb79958b8bba900c28d7e
SHA512501e588b0467c4b65611281aec67fed93284573c2386d2460611762a31feba17d510495462746b2b63e497bced44761f7b7cdcf8eab73b1c929487d58160f94e
-
Filesize
354B
MD525f49b59728abf2e0fa33581d37e2c74
SHA1a11466df9c04d5b5eac4882ef3ac0b3c79af0e6a
SHA2563abe61607c681e60a38cf0a5a9697e751c53741bd2199229a979b8da206c4a2e
SHA512a7becd0b123e512f780399543b0785135370e8a4158bbc4b6135b46ad319af30ab400586164ba8036e5dbc1b9d9c3b181e660f197813ca2119ba04083aed7029
-
Filesize
354B
MD5b24ff6106326744585f721b6656e7a8e
SHA1ec1e182829c70f27ed136656796e3c148ae04fc0
SHA2563d0daf30b511616752f22a343135a6d6bc1753e7f3de76edca4b35c2c8261bcf
SHA51250e0671795320a4d72d1107a0e8d6a5b532a635fd0c01ca13be401389d2a5fb86318fd9aec11ba724d0d06150720bc6124e0a88ed8c46a7e00cf52ff6bd64500
-
Filesize
9KB
MD518707eb1245f81ecd41d2964ece389b4
SHA1d35bfc82e10bdadf46e789ecbefcfd06338b4d91
SHA256e6fa3f98eb9054546a924a1cbc29d783222c17d533f5b9aa91098d5ff08a2450
SHA512de2ecf0a89bb7dc128148102000bdbcea5b8ad0cec22d28102e534fba3701deaea8cab07451f79e6ea0bda341d500f61dfba2cf8f8a076119af46e0008c66316
-
Filesize
9KB
MD551537c4b73f79d1d1952986061d714bc
SHA153fee1ef85612e5746ab2955df63446071930c97
SHA256476b3e4169cda81057190d8f0253a144537e9a1ebc906e85f58b01f4798fd2bd
SHA51237eafa266e6973c9c918d42a7fd6d141763933d6000d1a155281c5c482aaaceaa6bbd86b9359c6709353fbc328fba4eb828da954be79c429138c8b14afb4235f
-
Filesize
9KB
MD55aa41e30d02786b14933148314664472
SHA18983b30017b18aaebe4d1519b1b04ebe28be2652
SHA256b9535dfdfc2672017626ab3095bee0dcc51f4256e051a6010e4f1c074baad78e
SHA512de88e063a1291fa07fc44056721cdddbb354accff3fb4fc849129c5be0af20c774cc0b05f2644be5057337e0810e46f03300971549ca6348dd1fa4138686c975
-
Filesize
9KB
MD54255fd4bac11088e9eef51c3051e9eed
SHA144e79dc1b16d6cce832174313c8583a4bb707374
SHA2565c6111c86b56bf84244ab1a9174e4e30fcbe2f803d7a5b34c10d4662d457ce6a
SHA512557f6f0a9971780108dc9e73cb7f0d02854853f6e310a96d73d7fbf88d05192ff23f79d40ab870f0329ff973b385dbf07ed34d44b6a64db5537110f59d4f1262
-
Filesize
9KB
MD54a49f1d7a5faaadd40c3b1b21840e837
SHA10af198743b7b32f1128661a8a2ca0e4dab70e863
SHA256c7fd7408cf8da115e6cacc64977d50811abe2886e2c7ca54d438c1ff6b146e80
SHA5128e36a8e8772d408cc929961e907398f947aa392eb3add8d9a747d771d25202687c63ad70b2b9902d8326ef2e88eed1807d15be9af398b12d6421a4a39868d070
-
Filesize
9KB
MD5140037f55f64aef244c2f44a3aceaeaa
SHA1d432ea3afa1dcdc7c9d4520a4936b466be1c4d04
SHA256271f21d0223f5956fbe19e49d91e3b44b47f9acbbf93241d398e499bc791ad36
SHA512e22662caf925eea811cf0f1148eb555128daf3d1266508858215c50ce3933f51cf9aacf68a29b930f50bf90897a3d492cc19c255882fc70f0ff862908c0cd66b
-
Filesize
15KB
MD56f7c0e2184345eb33004f70b7391774e
SHA1329c0d4e192d44c469c2576ae58468abdb29a6d8
SHA256f672cafd66d1145aef52c633f10be6d7ad768d0b44a411ce0dff8a5c69e0a332
SHA5125fb31f156acc0e26ef4029448d3ded57b2cec8f6aa12a66fe947dac5836b2d21d34d5c580d2c7501d0b01a47b05f22ffb5d27ee2d852e6c4af547e987f14f6c7
-
Filesize
197KB
MD55919b0484bde81a35a317b029899dbef
SHA1f1014f28fb710e90225278fa5688b39378d251b3
SHA256a8321f0e606b915d4afd61737c4d914013644d2c4bf60641d7c8955c774f0e93
SHA5129bda79846bf456fea19dd7178f7d0c3a06fb32c36cd818e2dff9d3a81221cb3bf9518179679ba0d2de2799a5dcd006a798cc80fa87eeecff39987d110678d47b
-
Filesize
197KB
MD518d387ee48601a02a5bbcb41a8dbeed6
SHA11d95b56d6ce03ac8eebb297ca8ed7c2cf3c1b5d3
SHA2560d7f71b3dbc22ad7b109178131fa9f5eaf03b08cef726e229423e0e35772ec9b
SHA5126538fda3563065f10d264916d43f21b5ffe2d80de2705a1a571b02e90289cfd347ba9dedcc1c9010fbca88b34e887931b19b5b45e5286c6b44525682cca6dfbe
-
Filesize
152B
MD56837505dae817f02bbb549d3910f76ec
SHA14bead1243a3ed4ba876f30031d11b7fcd4052b84
SHA256997f7c6bb1805cb785d5c0ce131c8cb2362e6dc77efb38c3980f69b7a789a649
SHA5124382a76e27e70b6ecc05c14e9a1b915e36ca661cb868042b28d59a7d807ae1ba069aa0e734648225dee2b6dc33626f58ee24df1cc451217fa093f46d5df616d4
-
Filesize
152B
MD5e15f9acde9d56006be268b4025f94b5b
SHA15d36b646b34f0a1d08b6020f12e548db96865906
SHA256045480199f3befc5d2eee18f84e92cc5bf8881b76ac168085a987878da798e0c
SHA51222d43f812391c9fafde0a4e247212e491765e8f049eb56d692f248623b7a52044ceab8e6977675c343d502b460666bd72a4ea970f9aaa7a6b8a6c3a880bcc255
-
Filesize
5KB
MD5257636d261eede92730068c5c304577f
SHA1821a9ee11202be233486a76d9443acce2fca5f0e
SHA256832c1b482b21d2373dc004abd4051e53be362f19962d231eea4fcd9b4ac0f2bd
SHA512f6a8ff8b9f088b81ef435049a6dbe797b5893f4ad8a0501cced4e6c64e97534aa965aa9c80d0153eb0b81806ebfac55c31520ae46c6838c66bf12a65d7dec1d0
-
Filesize
6KB
MD52c3ae99e75c1f46377ddc34e08a641a4
SHA18cf0eb3eaad59b6cb81a386c0beb9f6b0b0c84fc
SHA256eaeff912c6dfcc95d31d78779e09994d56582eddc3d8dc33f6fc28100c36191e
SHA512faf2724c4abba7778ff7e68dc76bfeb0600e7e4ea6578f71a961990f5742bbd7df909904e56eb3429c3a131eb44f71ed8a184ff526aaeecdad90175c701c40cf
-
Filesize
5KB
MD53014f2dc6acf1d5de9414bd5d7e9eb80
SHA1289c1590837f00a89111d033c73264586c10cafa
SHA256b08e29681e029e6535d0a94f4fc891decac485c4c1edb0cd2f928efb5122c98f
SHA5125c5ce43c2dcf21a2588ff851f1045c59cd4f19ace09e7d0078248753f78110eb06b0468a2f99509a1f27941a2f8cf208b2e2044fb45877dd4416946e45038600
-
Filesize
24KB
MD5e311e8070a5db17b6cab425cdb01bd27
SHA1ac533db7fa0902f34d02662fd029facbf4b8e8c6
SHA256b9aaa4c71488c3a8769cee7cf502ab93813fd6df60ff2172ba8cb7e1dec86532
SHA51287accdca84a2b2042e2c12381cd1bc0fb2d74bbb0c6a4d18f444212803ebc0b7184317df7f5fb3eac722d5d43d942dd62ee1d760f0b3fd18911df5bd04fa31c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD539750325e353fdf9a7d009ea6f2f875a
SHA1e3db7a8b005cccf07cbfed7f1a08bc615f9a9316
SHA256d2498edebec0b12f735cbf8de9e3d336343041da36f4c47f0a6c80699957b4e6
SHA512ae3ff4cc71a5d9d457c72b16a51c3d6f2792b1931c4371a8d7154739b921e666590f5e33576b367d35a150be50bf9e9ff2fcbd7b0d58d1db3220ac335604aa9b
-
Filesize
10KB
MD56a48a4bd35206799d83a48b03bb9c0cb
SHA19aa0ebb40f3df0d8a00e7d1b940b7277af551239
SHA256d9f99d446c7084e06ac30152f668526ac214165b90b33e15d424035ff3094d07
SHA51236f4f09ee13764b2ce7812c79cea47b88af92b4746d759e8c5cfa6b283ff534ff9ab734f1d69fc11590477ade04ecc13619a8decc40c5f228800772ef23ad1cf
-
Filesize
264KB
MD50936baf39ff7d783b818d6598b87fda1
SHA124caa81bb74728b212afcf4b18ab28393e22c2fd
SHA256b7aff56aeaf52106df5c80aae6ee591d8bfb79872c4e1a4954bb8249366188b6
SHA512235dfdbaa62c998a71a0def7cdafcbd3c6394eebe1eba8ecac7a8b0f2e723c2b7e7b5e80d7a7095f60166b39c5f4acb8b27daa1bb121d99da180ae726601582c