Resubmissions
07-10-2024 19:03
241007-xqldtavhra 627-09-2024 23:46
240927-3samzsybkf 827-09-2024 23:14
240927-28aggsxbnh 1027-09-2024 23:12
240927-26vpmsvbjk 827-09-2024 20:13
240927-yzes3axdnk 827-09-2024 20:12
240927-yy349sxdmm 327-09-2024 20:10
240927-yxq4bazcma 327-09-2024 20:02
240927-yr5drazaqf 827-09-2024 19:59
240927-yqh45axamm 327-09-2024 19:56
240927-ynwx7swhll 3Analysis
-
max time kernel
30s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-09-24 2.11.17 PM.png
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Screenshot 2024-09-24 2.11.17 PM.png
Resource
win10v2004-20240802-en
General
-
Target
Screenshot 2024-09-24 2.11.17 PM.png
-
Size
45KB
-
MD5
578c76503d19e73f7a935cdfb1a4108e
-
SHA1
74644b49ebeb844cfa821fe70251f8e56ac6e112
-
SHA256
3e5e23c0adf484b96a726f9ecdbd4a3089ad7f8979329616b73e521825e183ae
-
SHA512
52b1cb29234be0e46a90cc26f8ac9ad6ff45887f80fbaf20da53bce7c9530111778317aaa393e6e94fe97f3f15372a0de869f709e768f278bd74ba989599ca0d
-
SSDEEP
768:54PXdrAREaTeqsZ+93ArVC7UpbJss0JAKEKFXsojUIFI5A29+FKn2g5Fh2O:54Pa1swmfNIOKEKSY29tnxhz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2288 1768 chrome.exe 31 PID 1768 wrote to memory of 2288 1768 chrome.exe 31 PID 1768 wrote to memory of 2288 1768 chrome.exe 31 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2720 1768 chrome.exe 33 PID 1768 wrote to memory of 2772 1768 chrome.exe 34 PID 1768 wrote to memory of 2772 1768 chrome.exe 34 PID 1768 wrote to memory of 2772 1768 chrome.exe 34 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35 PID 1768 wrote to memory of 2792 1768 chrome.exe 35
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-09-24 2.11.17 PM.png"1⤵PID:1016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef74e9758,0x7fef74e9768,0x7fef74e97782⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:22⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1384 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1512 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1592 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:22⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1648 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3580 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1240
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fe97688,0x13fe97698,0x13fe976a83⤵PID:556
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3788 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3756 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2988 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2356 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3968 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3844 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3812 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4076 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4336 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2068 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3780 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=1164 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:12⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3880 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3864 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4384 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4436 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:2628
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"2⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1256,i,12562750747131832962,8457473628295330618,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD5fec78f1ab5646cbc24229181de0c504d
SHA1571db81600725ca17cf8763752103423c0ed09ae
SHA2560ea5b6fba50d2a05704486398ece6ecee7a859a69e021b21cfd0dc08f4d39f6c
SHA5124d4601c191d16f7cf18d073a7ce425aa52998b4316ca916cbb36d6ea9e8758a03697b2e4111da08dc63022e6af5353a885deb3e3226e26af27e1df7effb7102c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56408d256d86681cc4beea75b856c6de6
SHA12b6a55e8db151b38e1fa600ff5171625521576af
SHA25652a7ce0b1f3a5f15a69ed3e4114d46bd6c7f801e7a969bbfc0b34b5be7d7ebc2
SHA512d2d4a5022f28dd75d6824cb9512132ea4b94024152b5c2acf457afb42faa07e94ebd984a1e1caf67de858ab2e83a3dc89befc475363a54337e73722eb31b7c89
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0f06f849-3321-4015-9047-4ab25681cb32.tmp
Filesize6KB
MD5005fd6d1e530f9b342cbaaa75706bd74
SHA1e24997bb344b91df84025a9daace08f9dd9cf5ec
SHA2568665abe59c1b613e428026efe1b405752a1adb9ca4206209e2c15390c5d0e0c1
SHA512a22b6040e9ddef9354d14e90ca6538b01a44b811fb9df6d9e467f5b8bc23def79742dfc0601f5ccf57afbba68b630a9c4408849841296b2e4f8d1e2ff654e03b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\62f2d139-c028-4687-abe4-eda4e889d203.tmp
Filesize6KB
MD58c39d5ea28e5eda184ddb884afac1f75
SHA1789c97613005c7edfd220d6a91e462b33a83e843
SHA2563a1f74c3fc6e784f67c710ae98dafa8419e079fdda63e1ecb42d7cf2a6b7ddda
SHA512fb99f7b0492e0f82c1727692e5bb4db011039dfecbf064250154c57a608c9c987215b8174169e51848e26cb328f5a7585935131478a338eb77b8c807754619fb
-
Filesize
100KB
MD52e52bee929ab7d56b2622ae84962e0dd
SHA17fd648bb1fb1f069578e992972d7f22ef1bfb36b
SHA25658a0ed06b38f7886418d565ea4cdb15345b40a1d29e635e167870f45fe14ed4b
SHA512c53ceaa60c9591ad0e61e82ebc1b5c6dd46a7b4a1b7ac303aeced0f4a0611e4af2b7a5e1febda5fb10041d0a9c76202ed05bc3e344bb6ac6cc35529e127e9d8c
-
Filesize
2KB
MD56ccbd352900ae323a2be8eda8b4989cf
SHA1bb307e1a85923267e69e54ee62a0531f7b8df58e
SHA2560672f004cf7017dc1ac382be08d64775ad0d43043cc8369e5d484b4008f7c6a0
SHA51276181515fb604fe2d0ff3ecdb807b9f5491f784627532401be86c6ee7764dd36da03476f145f832cb9f45a95df8735e7ec7a6eaf24bb71e6ec4e7bfe51d8f5de
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT~RFf77b5d7.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD506fe63523378b58cface69369d17f582
SHA115671e3611dc3c70561b1e6682a20cd44db75cfc
SHA2567cf8671fc7e2b86f44ed9428517b0c927fdd1d9dacdf225dfc14a05d7e343284
SHA512a034d2e008be3f10a0c9d957554ef6c09de8dba3937a3e99a56b1b1152ad379f2e32596f4d043a8d3ee7fd3cb36bf1afcee943665afcd4cbf0ea6845b61d6006
-
Filesize
2KB
MD5105509fe238aa08f26164e567bdf427b
SHA17c83a4a78c41a76aa502beb501b4e5edc7fff127
SHA2561e5134f1dc2559b6bff45eabab4c832204c9e53705b0075a2aff28b5f04b5166
SHA512545e03e3144b96b84e31efd1567bb7db78c7877ae8d5b99c89e01dd0f3e4d94c18d212c15e298af8a489a6ac7a6ef721459286d626599bc914294ed8c4a5f6a9
-
Filesize
4KB
MD539a2ff38e8359d86eebc62eda8cd8d3f
SHA18666343a6b54e3aabe139c5e3345563155d794f5
SHA256c5e7408f9098e35dd6afb86c9860154ad3f99e72e93c42f72c46d7fb16927cd9
SHA51246eda08cfef5b2b81fd198c7e2b1d10b2177f02fd6476ac97ac5d078aca6a68ec78f475efcf5fd5c82ac4241f9425671e105a56f3574909f2f2c70232220d3bf
-
Filesize
1KB
MD550b310e10a9405b28e307f4e9348b1a1
SHA144bee92d0aa0265e345865c45c3503ed7933d1b0
SHA256bda3fa071e97399bb856b4b6feafe293cfdcffc78ffda841b3810cedc5a981ac
SHA512424a75082fda37f0c02b0845fe5f72a5a76dac0c91ba7224e233fdbee8c698c4118db8ab3dbcf1ad3119ad6df4d90bc61f189caf13fcbf43954fc3daa89a2857
-
Filesize
689B
MD5805e8eb3cfe09cc4e2233b275a5204dd
SHA158e1be97f32048be4b6542777c776ba23fdc927d
SHA2560b676269b2e6ec6bf282dea79d7c1297d11868c2b371077e6ea51f67da68acb5
SHA5124283ce6ecf9de297fac6c752e6f22365f37cbecd735d41a10e5cdffa3002f3fa1ce7c2a1e475304a32e4dba931dd674ec1cd6727fee06fc8f32dd79ab83ec585
-
Filesize
4KB
MD583a04425499cdf0fcacab053b1361a25
SHA1c7e7ce9bc0e4c96a64f2d025dba613f94bf0680e
SHA256f36e598bf6ee17d536959295b2c56bf6b1eb8c78e67d7ad0ceb7e875afe155ad
SHA512cda301fad95036672d338429c3cb19d82e6a8b878965f2b31594d8bc33feceeb856a93992f3412f187a8a131703e768a4bf0006b41720c7c86bdc9d30ee6b378
-
Filesize
3KB
MD5ad02442ca3f5b6638aceb4961399d2d5
SHA1e6c92875b6ec17f6f552e0593462d6408393317f
SHA256ee89dd5cd566ac788b7f3b6f9535f55685ee96558b2aca7d06d7fa3c9cddca5b
SHA5126aaaf07527bc91dbfc35a7350037fa517f72454af168a8c3f62c6727c70fa0a327ea6f0aeda4a269688e441e7d5d531740a3046f485859f8198d258ffe1cb3fd
-
Filesize
1KB
MD5d52bc788758dfa4cc6fdf736c6dcf658
SHA11301ef02d93a833fcf4917756c52f175babf05bd
SHA256245facb692d322c8b4475f91daae2b3cd1f26525914c8451e8d105536137c708
SHA512085529c2b91643a26c1833de84947204983056bf75ae52a6bba7d4e3a8c7ed23ed294783c4d886d594a642a7cb794e92b2becae21ff4e36fcf9f9306d524f0f1
-
Filesize
4KB
MD54fb875c970df758d123929f688db4b5d
SHA1b31c5ea9bbea80f42516c25cf91053fc6c029a6b
SHA2560cd75357b198ab0edaf0b9c48fcd982415e62ccf29d7926ee4e09a062e0dcd43
SHA51222cad0e43bda081255c20e4a60a39ab4d446863cc142af9123805446cc8b8b4f0c3b1392dba7ee86faee96cacba2049a5724e635733ee4c253e9c70c94c5648a
-
Filesize
1KB
MD586d8b6e0c3a210e10b43da8ec1f685d8
SHA1db4e61d95b803e0d3b3c99baf2505b0f211ac0ac
SHA256235fa8e09151770fe4dfd4adc1d2b5fc8d46d426ca98bef3424f4618366e1c5a
SHA512c50369bd9c71a66870311b2eba909d0828fb607035a5f3a7b3397088b1ce6d06b0c0d9cd915863f0e2f7349cc78b383a13ea371015efbda8050db970f10b9830
-
Filesize
4KB
MD5fcef4c75cad399c20e536d50e11d0c19
SHA10c1c23170a11024f5c2761decbbec41d1b071213
SHA256dabbe6f6d6f63780922ca2890284d18dba51ddd2e178f497be71b87c610ab14b
SHA5123601bfba1b3bbf3468aa2d80b5a66f2af53c434b914a8adb7092daf992d06aa08da5b78e9a68232eba2250b349c049ea295e3ad30f17cdc68611034d3ad485b3
-
Filesize
361B
MD531e183642a76c08b470c266cb9e56fe5
SHA17e31f037904c64e92250397eda9a63aa83594097
SHA25632dd2ed83437dbc090c686ae046466ddb66d4ba035c7aa35070998549747c2ea
SHA512d10bfe3443ece1c944663b7677e7da7316351bdc02d103eff89dc7e91e6b34cd939970a173461086b8fd1d6e6d73391d3249bc7381aa1f9a0664e05720307e19
-
Filesize
4KB
MD5c8fef74c036477213b9016852317a16b
SHA1b1fedbd06e9db3fe0862d4d8cc505c61a71f1fe6
SHA2565499a355ad8494c2163a390bf9e7f1a790c44bc938b9d506c85bb1670fddb0e3
SHA512525563f77db940b65505a4a4c03900cd1a8e8d283cf0fc6a6bbd3a21fe057cde4162955c295a38cbdc731f57e7f68c047bdb092c6ae8428da7a0846ff00c7b61
-
Filesize
6KB
MD52483b8bb4df51b4d4334405469f59373
SHA1312169b7b6cdef203b024105f0a67703013edfc7
SHA25678d0f29904fa12beb64d4b713c01bf59f2340f7796cc512f4b5ba34fc6ebce35
SHA512d2b740407631b38f3504edbdecd2b70e2d8f46d7e66a37fea1b9999dab2acec0dfe056d541196f60b979450e1f5c76763f79757346e7332fcd736a340d1d41da
-
Filesize
5KB
MD58e05b27d2407ef6b9a4471b3127e37e1
SHA18438565570b77d864ba1994dc307b49176ab50a1
SHA2565e21722896ce9e3fcbd170ae9f27ef1c3fbf9d2270f1ca432ec71741d8b4250d
SHA5129e0aaf21b7c1b20b2dd3bf61942a6a1efe5cdfdb9393f0ba51efc88f3ae5045b9d15897736d632e5c52b6d1ddeeaac4fadf00ae5d07baa5f5de5f292422708b4
-
Filesize
6KB
MD5ce7330e117cd3bb03fd9afe7276c8fc0
SHA1b44724cf481c0ebd41697b2c830c81c927b5e35a
SHA2569c45b60567dc22e4b46953e020894305ca8756c79d51dd9cdcc6b393e4acca71
SHA512882bcf2c556df00a81cb88eddc13a5111d25def9d91d465a3ffe99c98fed2594d29fe09e43ef81eccf78d2b6b8205fe71f15b24f5e887212b744d1001066bfc6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
342KB
MD5b9ac8186dff5a2284475dccfa358eab1
SHA172fae7778a2c4017856f8b20dadb659c5000bef2
SHA2568a1f5539b01c0a0260bf1bf8c2de630c0600de435a8022267ac4e1aea0439926
SHA512c5064e63863974263abd70dc611f71966c893c7a69f240c25356ab8bf91c9d438c0e803729ab3ad7d3f17d98489a2955e32849530baf80f26af106d797cf0c64
-
Filesize
75KB
MD5441aa83715ed715e2ff2222a7bab1d58
SHA193f8802b259ddeb2a3d6dcaea7fcef68ea11258e
SHA256822040cdcc79997e86fea4f713fbb601cad298cbbe91880b06b25730c96d3e97
SHA5123c1ea268f801773bf035f3af4be5866294cbb4a19c592baf6605c39061cca8788445e76a2770674e0b904d2dc539edf01e5d7666d6a44abba3a3c4ef9a02a682
-
Filesize
84KB
MD564522e1854c55c063a019dac5de8ee21
SHA1f20adb6df551ac3569907544042078ba320bd131
SHA256f968f97e9c0c21dde45be2d1fbb66a0dc98e37e8fcbb7a74fd2ab6921a81c154
SHA512be3d9d3af48f2b11d644af738a719e93c7772a883a111c4b4a271f6177904e77c6960804cfa9fe8a9d1ebdf2456003863a5be0c8d03c8cc2bde18e81a8319eb7
-
Filesize
77KB
MD5fab87d61d745160fcde8fbe1aeacaa8c
SHA152eb8739f2a91cf2b76332cb587f1735f9235dee
SHA2569d3488daf865fdd9a8f86cc545c397166c134116046dd0f3c3b9de4b164c5bc3
SHA51248587281e66b641da6353571896d30385af4761a71f3b0e88ca77e2e6c8750e8bd1be9a221ee7aaff3db993a2a6759891b8fced1d09459b48bfdb21149df6b2c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6.5MB
MD5bfbd6cc26087166af3a64398260ead58
SHA1c50f08bffce2a709dee9af3ae6b96bb482abd4f9
SHA25695c5f519a5f729ec1205f9f1c69b3e370e468ed5d1c7675502a9c9ef227509c9
SHA512c23683291b4b0e0f555fd715ba6e685faa5a952df95c70df69010e2f6c9f0fd7f593f030fab068207ff97583e049b52674e85bd41fc5901f817b4ec080d945e3