Resubmissions
07-11-2024 06:52
241107-hnee6ayanp 1007-11-2024 06:51
241107-hmnx7sxjaz 1007-11-2024 06:49
241107-hlwawswrhz 1007-11-2024 06:48
241107-hk3ctayaln 1007-11-2024 06:45
241107-hjdcasyajl 1005-11-2024 18:32
241105-w6ncnswcqe 10Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 18:32
Behavioral task
behavioral1
Sample
Client/Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client/Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client/Client-built.exe
-
Size
78KB
-
MD5
7e60d19b97042f52c18c1d924aec839f
-
SHA1
44fa1257c07125d6f2300145cde7e112db18d8e6
-
SHA256
bb8a88f17cdb00aeb4c1edf3361b7d835ab7ca1de83c9b08a1b7a34d9197bcdd
-
SHA512
09c1fabef784040dbc87b49994294ee104f72bdfdbdb705bbea0c21bddff376edfb7bb4195af148a00d6342e7c4703a585b085bcb4aaa6e8939d2728947e5123
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+obPIC:5Zv5PDwbjNrmAE+oTIC
Malware Config
Extracted
discordrat
-
discord_token
MTMwMjYzMjM5NzQ4MDc5MjExNQ.G54kHc.dXC4p2G7m3XikvtpmbIepFkTto52Uc1y1nNfUQ
-
server_id
1302402013232894144
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 624 chrome.exe 624 chrome.exe 708 chrome.exe 708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
Processes:
chrome.exechrome.exedescription pid process Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe Token: SeShutdownPrivilege 708 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exechrome.exepid process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exechrome.exepid process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Client-built.exechrome.exedescription pid process target process PID 1292 wrote to memory of 2552 1292 Client-built.exe WerFault.exe PID 1292 wrote to memory of 2552 1292 Client-built.exe WerFault.exe PID 1292 wrote to memory of 2552 1292 Client-built.exe WerFault.exe PID 624 wrote to memory of 2260 624 chrome.exe chrome.exe PID 624 wrote to memory of 2260 624 chrome.exe chrome.exe PID 624 wrote to memory of 2260 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2884 624 chrome.exe chrome.exe PID 624 wrote to memory of 2764 624 chrome.exe chrome.exe PID 624 wrote to memory of 2764 624 chrome.exe chrome.exe PID 624 wrote to memory of 2764 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe PID 624 wrote to memory of 2740 624 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client\Client-built.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1292 -s 5962⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6969758,0x7fef6969768,0x7fef69697782⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:22⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2156 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2864 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:22⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2608 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3452 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1380,i,14305999142261518080,17588665904757496914,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2120
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6969758,0x7fef6969768,0x7fef69697782⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:22⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1148 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:22⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2896 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3236 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3204 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1376,i,626410577977282839,13934182491006650524,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5a5ff7b8d3f9da95f3edc95416ad0ee3a
SHA1a1d3fb57133e5369e14db282af76e1c6593cc9b2
SHA2567237c8d0f62cf771e73c5e6099e0ff332f3bd57474348b304390afb190f9fcfd
SHA512d0ac399fbcf673e3045e62b5bdeee954cf08fe562f2aba8c718980b504e00af2cb3c14ee28c719fc46058cb9ede922f373f2d53e585e29c4d7e1d2eecea2898e
-
Filesize
44KB
MD5158b42f0253415933b0769a44f701c27
SHA1933812832150e096359e63d8f45d5c2048b1dcf5
SHA256be7783fa057d460292a5c2f61e90a51a2ed0c1d25efb8ec1b9f01ed983656509
SHA512f35c08b4ba842b7d6be2a1121300a4f694f3550986a734a5a46fcb1b2e1efa5fed5c3938c3a0ac5e3dd9f59a0ab4b245bc3c36727433918a13592939c54b84f0
-
Filesize
264KB
MD5aa1efd31c33ab7929a5781b8d576fda1
SHA1803dec10f4a33f6d470ede0e61bbad97c752d1f0
SHA2562ff2cd4c7dd76785f3fb41684c1f343aa63029ece7bd42532201fa2c1e6ceaaa
SHA51220b9ba77a42b529feae2ca656918d77e02f8801aab75736c9ea499b5e2899d18e037e48d5b000bad8249c3bbc0dc99f0b1640777a9c5e9ac875217f7d1a88731
-
Filesize
1.0MB
MD5d15e480e0e485a1bb94ff772ca6ea081
SHA107b84060e8abaef549a3bbf836eb63445832f0e9
SHA2568b0b879e50d6309e735c64c31dd79413fd4cc51b6f379667d88ea007dfdfb7e0
SHA512ee94c8f50d7714df64cb841c9524e74237d3cd4baf1bebd16cc60629a5c74bf41563b08b7709c3752df6195b03abbb938765e16991a5ef12e115c4fd4dddc351
-
Filesize
4.0MB
MD535a5cb7bceaa684c60c88891fe0b4147
SHA116e9738bb780bee252f2d90b51e6b94b3e29aa43
SHA256cb3dce4388f2f7f775387422e1dc1c4f77a19c41bcf430cbafd003a865d7aef6
SHA512d24d63fd210d1e347153f5a1e685ffecf74b0bec459e19c6361a8740510d0efd6418ec6444279d2bbffb9f898db9362d8532b085d927ec2cec9bce3d77e44451
-
Filesize
36KB
MD575755151477b232bedcb62ee38796204
SHA1463a919df50efe6d0b3206ea35eb661b3d9ac3d4
SHA256920b83cf9ecf830f1ad6756775b881aa39543448d67b05a1e3a116508ec35556
SHA512f8583c1f06d2b6f7c1186af229be94194a2c53eebcef5f7273f2c8383cfd0461b7b8d59c0d92841aec20a3b1d0e66f850c61d4a14864d3ef10d5b945f3aae7ac
-
Filesize
62KB
MD5e5fc91cbce096df1d36191f9eedd3c64
SHA11a8076bf524b6d2b8a44c18fa8afb199a60dc1c9
SHA2560e111dba5797ec182bf4af537a2c928ebd3957b99ed291610fbf322d6c2c9e19
SHA512c9b064fbcb2df48dcf5bfa4387c164acb2bae075af013e6c39166dddc7e91ce993caaa0fdfac3ba1c3a12ca6c21577d99776fb1445f3009c7359b926a173f668
-
Filesize
38KB
MD5d4586933fabd5754ef925c6e940472f4
SHA1a77f36a596ef86e1ad10444b2679e1531995b553
SHA2566e1c3edffec71a01e11e30aa359952213ac2f297c5014f36027f308a18df75d2
SHA5126ce33a8da7730035fb6b67ed59f32029c3a94b0a5d7dc5aa58c9583820bb01ef59dd55c1c142f392e02da86c8699b2294aff2d7c0e4c3a59fce5f792c749c5ce
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
136B
MD58de00599fed34316126ca98174e89f66
SHA15ddda9fe2967fa18ac17817696301045c30d8ee2
SHA256765d4145ae8930bfe96cb2771101613a12555866a1f42c850ef4ac62fb23d309
SHA512296221d43cff0af1440ab884d233d4a01ef1c38f758301f408fd2b7cde474ff743c0e0f416cbbdb0babaa496c1beb492bdbccbd7f96bd09aecd305d4891a37fd
-
Filesize
50B
MD51be22f40a06c4e7348f4e7eaf40634a9
SHA18205ec74cd32ef63b1cc274181a74b95eedf86df
SHA25645a28788cde0d2a0232d19c391eae45777fe640790ac0674d6daa5672c444691
SHA512b8f6f42d375e3ad8015d744fa2814994fa6e588b41cce0131fca48194dd40146b08169a8ce0da350525ff32a59a16edb503c72e0f07254955c82a0d38074856e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
136B
MD574241f7ebc2808a01b03427c36a57716
SHA1fd3f8f53ec099a47a986f183dc54f2da4bb835a9
SHA25686b2499babcd80385e702fea07e192e6e67ddf28754b9e3579dbee64fcf061f6
SHA512fbd48094b30009864979c7693e1ae19eb06fdb4eab15c3127bac86dd465a13ba288cc7c59e0c9d05b741fcb7d6af5dbc2de9299e8d7ccc03b7d7d5e4c07481c6
-
Filesize
50B
MD578c55e45e9d1dc2e44283cf45c66728a
SHA188e234d9f7a513c4806845ce5c07e0016cf13352
SHA2567b69a2bee12703825dc20e7d07292125180b86685d2d1b9fd097df76fc6791ec
SHA512f2ad4594024871286b98a94223b8e7155c7934ef4ebb55f25a4a485a059f75b572d21bc96e9b48ed394be8a41fe0208f7bfb6e28a79d75640c5b684f0c848fe3
-
Filesize
1KB
MD5df35088febf8989cb0d6066d82ccf117
SHA1bda75156ff96777ffc4bbdf28b96031d77b8dc81
SHA2569931bc2465f02c638c3d109770490c87e8e7bf42f931606dc2c145a8c18943c1
SHA5125602773b55eb58784e55eb0d4f10b50f52ba6453f90339c67acde249f361032a29470b9d2803581c3670ae6cd6087eb7e42af14b1cded5891848c021e928b52c
-
Filesize
36KB
MD536f26ea073783cea5b50628f9f824462
SHA195f4e8893818871de9200214568b903b030f4e26
SHA256f2141deabe1cb68f81e797c7d25586859172aa492ad4451a11159949f262e3b3
SHA512de18e640c3eb862a1875737bed1c686d28dfdcc37df4cff8c6bf2022768c5c7ae9cf80623b9b61e7ee1c07d390a5cc069a1ace9d5e35669bb372f75f263fdfb0
-
Filesize
359B
MD564c97603dcbdebd595e8853c35cfa9ca
SHA1d1b30407d449496e489e8930eb48ff6a5da61f3d
SHA2563dcfc818b0421ead239bfbb81ed18cbcb7c74c004ba64cf95ae169792f4958ea
SHA5122f417bedede83731e2780767852ad792642faaf377f67844d7bba2c249dfae4c4818c8db6dfd8d066906e88e8d513761182d42ad59cebd8a1be3bc6a2b2e656e
-
Filesize
5KB
MD5cb47ee03e69fdfc45b3f5067368d7048
SHA1516a63a562b3041e555ad26a0ffe6ef0f2e564a2
SHA256f3e55a31bdfd64a03da5d1bd74f3b36c37226c1e060a15e263eddddaccac868f
SHA512d3c53856f7a52aa777a652ded85fc585b8342e8f298ad52277a8b154f9d2f9ce2ee3b073e1eec595779b4822b47ab97776b846407eb1be42f624eb41fad2ea7d
-
Filesize
5KB
MD5a2d37bf740ea09a2eb86a8c8adae8efa
SHA114cd2a91bafb9988c54ce6c9737db07805b8500d
SHA2563b63fbc33c364bf181d0f1e1dd552a03a13c36bbf5f18cdafbe041aa493b7248
SHA512de68024d7e2849a16f0981381cf0f01b927c678ae13a53b1b19e3ef56cf0724a5e36f4b9874eeadbdabc9afe979585ba9174b9e80a684a15eaac7809e5d98c62
-
Filesize
5KB
MD5cc05132a0180351c5707dde8057d891b
SHA1407e6d161e69364e039a9dec9e38f6f384af943e
SHA256602f44d9c80ec691b566d420fddc3ee37b5d68bdaa69c2ec0ffa9ce6fab493c4
SHA5120ca4afcb94399d11282ab1ba4f0dfe9134631096aa855a1b7d519261c33d32e754503d5ae6fe6181729839bb07b0f72dd545adfb7113643d17866038cb13e205
-
Filesize
38B
MD5e9c694b34731bf91073cf432768a9c44
SHA1861f5a99ad9ef017106ca6826efe42413cda1a0e
SHA25601c766e2c0228436212045fa98d970a0ad1f1f73abaa6a26e97c6639a4950d85
SHA5122a359571c4326559459c881cba4ff4fa9f312f6a7c2955b120b907430b700ea6fd42a48fbb3cc9f0ca2950d114df036d1bb3b0618d137a36ebaaa17092fe5f01
-
Filesize
247B
MD561b7ec8913031ed4f28ad336530e3f9b
SHA1f88240c7c3b8f1a172f4998ea7291e8fb28da96b
SHA2563693431e786f0e5305565948dff924a47357314424609eff9ad876fb5eb9c713
SHA5120012f6291f1134fb60b48737042f410946f5d6b328df48b8adbb78ad6df905ca1eef5faf15cd14e758adbd71a647ef5c34192ed0a79857f5b6bfdb4b43359d16
-
Filesize
90B
MD5b6d5d86412551e2d21c97af6f00d20c3
SHA1543302ae0c758954e222399987bb5e364be89029
SHA256e0b2fdc217d9c571a35f41c21ed2596309f3f00a7297a8d1ded05f54f0e68191
SHA5125b56ae73a61add9e26f77d95c9b823f82a7fcdc75eed64b388fb4967f5c6c42cb0796b0b99dc25c89f38952786176c10d173dec7862a8a5ce5f820280f72d665
-
Filesize
136B
MD5b8a4646b42e3fd36507d4521ecd9d043
SHA1294a23b4213747270af9a7acd61e05d36c16f1bb
SHA256c35ac809e1ca845c31eae0b8bf61bb75e8dbbe150a9f20789bd7d94f962152e2
SHA51237d1ee4b0e59b6f1a521ad032b46469162ccfdbf491cfb058979942734f384bc202522fb9ae8ac682e823435172c3526af0b7e7e41af06d42568612e9af8a4ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\MANIFEST-000007
Filesize107B
MD522b937965712bdbc90f3c4e5cd2a8950
SHA125a5df32156e12134996410c5f7d9e59b1d6c155
SHA256cad3bbec41899ea5205612fc1494fa7ba88847fb75437a2def22211a4003e2eb
SHA512931427ad4609ab4ca12b2ee852d4965680f58602b00c182a2d340acf3163d888be6cfad87ca089f2b47929ddfa66be03ab13a6d24922397334d6997d4c8ede3b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1KB
MD511adda63486421b7272510c29b5eff3f
SHA1ace4f2d1aedcd945e5cc75b5fd669efd4bb35778
SHA256140da9b1707935b11412900464e7fe3b093d08e508a46ce0c44ad81fabf69c2d
SHA512dad94f6bac7b2776781bd32955f8c143cdcf728cce1ac7138db414016fd4663054b0d71664152298d28e59f72ba8265546e217d56237f4210d1d52155456f1ba
-
Filesize
250B
MD58fe9b3b249ca5ecc8cbcbbbfbb6ce8cd
SHA1c97e7f7a328f9687eb27471093df14d8739cc8ce
SHA256d5846ba1ed7c7f5635332830eddc861701e00f641fe8f01f7e421fc182c8e3e1
SHA512f10c1ab60d0206fcdd6c7b2a61354ac5d8ed242af49c0935756072ad5e8eb49ad886c03224dcea40f13145581289a20ddd394494c174db3268b8bd8a03cf43d1
-
Filesize
250B
MD503d881fc5a4ab4013bd1b30988abb179
SHA19ad861569715575d7b676e5683b14dd3cffec304
SHA2565da7b30f55f920166ad821f532fb95bd11546bf63a228fc41357aa122fcaf5e8
SHA51229ab8ac2c642a83086266f88ffde8d71c96cd0d98812fac526e0a0adc58d8bc7f99760ad19a71cc38c3ef5edb9ab9d642ef6b665bf4ce336260b0171411e26f6
-
Filesize
485B
MD5feb8fa6922c9845736264fb2668c4bf5
SHA1c62e0c1d6852e89a1496bc9eb20a5e9678b0b0bf
SHA256499cae945b7a3ae91fe8d6799dfe6ed933510806bd68c868189f61ce0511a1e3
SHA512291dccf5a43329cacf6c4f1ba0f8fda49600155f6986196934bdd7449f12d821b2caf6e30b932e34740ece2e389c9891763534fb5efc27a18b394c4a71282849
-
Filesize
19B
MD5a2f36fd75efcba856d1371d330ed4751
SHA1fb7c3dff0fa2b47c6f0026287d12d16d05d14d8b
SHA256561fe33b81dac187686e9e50103590f3a857f4e1b9c8ada714d43964b938ea7f
SHA51279ca96560a074fa678cfdc06007d0e1e01718831d18c4a800c5361b8ba8091b46acada47418a8d7be3b626d2d9af5cf346abcdd88166a9d1634f81157ab1ad6a
-
Filesize
249B
MD56d3a8a8b7449ddf53f25744bea0813d0
SHA11abbee45bd7240c7f0a5c3caafab00a21f6a7e01
SHA25604167852b4f7aaccc7bef38bb68ba9ca5d52632626fc1a872f7180f846cd88a2
SHA512428c74944f959ee3a6328da1376c05cff05b0647cd8d3c893c0cd281395d9c62e3c43054e7edd9c346878cd2cac185cf94c2edab9ec0b72928e1d9e1cfc96fb3
-
Filesize
98B
MD51c0c23649f958fa25b0407c289db12da
SHA15f6b10cd5a39fe8c30353bcf4cd4e4a60ef35574
SHA256d5134b804a775cfb79c6166d15b5721d38ffc2da11948a6c1263595d6c2941cf
SHA512b691e882018833a108bd286bc76c55a140d00d5a266617a3a381af1ceff01aefaef17acef29d14dec931d7051455726cde8974cd04cc07302f1c3cc452fe2f52
-
Filesize
315B
MD57f752f0ffd35366642c56ec99d0c752f
SHA136801ed532b469b6db90f77adeaca2a165fd8ccd
SHA256a4ad6c25c37c7e01ec4a6fce255d365ea1df919116a920ca8abe8b1cacb5b360
SHA5123cc3a62a20626b7b30e1f12498f1c269d791c9756e183ed4ed757cf7c96fe4d51572fef994f33b60543986726342282b6fa433bc01c21bd690b6e04244dc9eb1
-
Filesize
34B
MD512275f46db968e27e4edb23a4517904d
SHA11bd41f5f55dc8532c45c5ed91bd0823deabe3d3a
SHA2560b9769e63620205002586d7dbefa19d6c3573ffa65bc86eb49113ec271feea4a
SHA512084364c331be5c6b8c537a6c56b732ccdbb45f0d74a1e0ed89ac195e9ae43e15f15c953e3ed188990f0abb7e0e6456fa4b6b34562a02c180f7c061a7728c8b66
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
Filesize
249B
MD512209b4fb5da2ee23b0a51b47bd27b0b
SHA15d5c020e9e0549f4a35229b5e25f7aa8b884b294
SHA256135a7a24e08a220635c3e0d25791e54dddb28d973ba603711a6463c21600e228
SHA5129cd153dbb3efc593d0bd4fc8d81d31fef90f6701fbc3f09255d88a4ff9e7de2003b62d885f2c1eb04772821b7b8f49d767cd966038dd757888c1e5448da4c7b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000007
Filesize118B
MD51c2107d4e3c80dadb6b349e42a419049
SHA1b38b68088655a66e4b2111ca3728182fa63f9d04
SHA2566c8a27990ff1de53260117dd8a16297f7412a238b2e508336745f3c051daedbe
SHA51266d8dcce40e3dc33ef7a9a5d79ecd299ad598bf411a038425a1ab526742d154cc48285bd530e99a6b79ed9fe4f296a1c829891992bb350161642d40d3f6ddde5
-
Filesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
344KB
MD5f64f5f1d6293565d73067c90d2a2b05f
SHA1f2f04173e359e34bc29c2cbb788b994c7a46532d
SHA2560bf012fc7ab4c718dd2e983129b287f1e9dc9dd4b6ad70c7ac164449f4051e31
SHA51280c5a7e64750b8442ec53375bfc9cf9ffc0f65576391b63c85b3e5f5ebf51c7235dd165741fd7d8fca438cc53823b8f4e2fb74c3fad0b194a9806cfd70b47907
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e