Analysis
-
max time kernel
289s -
max time network
396s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 13:23
Static task
static1
General
-
Target
! Prefabs.txt
-
Size
17KB
-
MD5
6fc06edcb562b363ae47fe9dd553b23e
-
SHA1
2bddabe7eb5851cc685ff0ce6639d6654d76380b
-
SHA256
a9f6ca54ef2bf71e056c7ad098f64aa6f558ed2827b212b0a817877a4e43466c
-
SHA512
9143645b5b11d75361fcd81865464690641bd7a26fb5a6c1bc333a3fe13fa43aa35913faa3a615bafc814325afa7dd96f2a789b2cdea0a70034f073db32416ae
-
SSDEEP
384:7iF7lV68CrBAOVVCbGV6SqZdQNCR88Tg7AlkuYiLhPxb8kwL2V:u5rOrC86SqUCfg7AlkuYiLRxbTIq
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral1/memory/816-653-0x0000000000F10000-0x00000000061C6000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Growtopia family
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2784 2044 chrome.exe 31 PID 2044 wrote to memory of 2784 2044 chrome.exe 31 PID 2044 wrote to memory of 2784 2044 chrome.exe 31 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2900 2044 chrome.exe 33 PID 2044 wrote to memory of 2860 2044 chrome.exe 34 PID 2044 wrote to memory of 2860 2044 chrome.exe 34 PID 2044 wrote to memory of 2860 2044 chrome.exe 34 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35 PID 2044 wrote to memory of 2688 2044 chrome.exe 35
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\! Prefabs.txt"1⤵PID:2296
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7db9758,0x7fef7db9768,0x7fef7db97782⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:22⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2116 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2128 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1288 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:22⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3212 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3676 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3456 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3228 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1888 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3820 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3192 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4004 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=688 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3888 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1392 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2840 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=2432 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=2312 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=2300 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=680 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3840 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3768 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1028 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3832 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3388 --field-trial-handle=1276,i,17106581826938752685,11784070377080238001,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2444
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2352
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5901⤵PID:2848
-
C:\Users\Admin\Desktop\Galaxy.exe"C:\Users\Admin\Desktop\Galaxy.exe"1⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:1788
-
-
C:\Users\Admin\Desktop\Galaxy.exe"C:\Users\Admin\Desktop\Galaxy.exe"1⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2d65505e-73f0-4969-a239-3a1bbcb6b3a6.tmp
Filesize7KB
MD5ec51cc85e488fbcfe01aabd4a100b0d0
SHA1e9d9993f0636cdd613d5cba2a058fad7a4db365a
SHA256f58c468ef86c3602153b0a85556baff062e8ccc6ade04309d52135271ba07f93
SHA512912618393162d743cbfd0d0c99dc38fd3c1e109940c3a6cc6625f4901890ca91e192a78155e46e4cbb45a658451e972c238c10cbcf2ca13c18d515ad2630fda0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5fdc701d-fffb-46b3-a3a2-f82ed60edab6.tmp
Filesize7KB
MD5cdef9bc2aa47e460b958f070362aa11f
SHA13e7b42a734a4c44384646c3bfa33459a5108d769
SHA2561843fe09feaa157f7d19ac06627211b5520f1231fd43ac20063c485df465c6df
SHA51259d4b0193078fdb3e1ebc667029076e7babbe9ff26e84c244a360a98608ba8f266ac31e18275b3d70e208390f0a190307b25694a8934eab1f63df69523677be1
-
Filesize
112KB
MD5f91354dee893e5b5f7eedf08fb503e05
SHA1a291685de177c087466c10c920907d99b3472bf4
SHA25650d56951f0baa312d62451574206a628c60e3a195361e373a36543eba12ae8e8
SHA512f31b12d4735a4be4a4934cb816d210be9b461afd36b69d931cddb74cdd3b2ca1b04e955c801b7d8978db40b6b4d496b667cc73d54c61a3f5fd249204433ce42a
-
Filesize
168B
MD5550a43f1c5eb7b4865f7ceebb1c8473b
SHA1d45ae8be795f31516784774ccd976e404a1fc615
SHA256432f25bea662ece0c62425c91459a3ae7729a38d3edf9a737d44f5a6305817d0
SHA5123276919811bcfbd4f0fe059d7b258768083193b4b870c0dbc3ff7486a6f418b7e51abcdc8aee410c8c11438dbbeb965e62b4a632e09fb5b419b1e1f8414d2923
-
Filesize
408B
MD5ff2b8b96083432d242d9539138520fa6
SHA197351fd4786b4369eac4cffd01b7c1b5d048d1e8
SHA256ab730228690704ca06ab61a16a6e3c0a0c4ffdee3ad47cc1e5b2c369a9991db1
SHA51247e56aaeffb8c0cfab9443d67d4f316fa774a0913980ffdcbee4d609bc914a430ce94153315bb5e2b5fe763fa5ef207527eba19054f714b909ca8738f9d6042b
-
Filesize
480B
MD59239dfcd0645ea63ccc3f5a425ed0a89
SHA17fb5c7c1a750dec853895f6b4e2e3e471e20e166
SHA256203b54f80a51eff2769a4b9c20f2c2e4a7be135f4aba615986f6e849b32ad75c
SHA512659319f715473611f13a7df0185374e595285a142a8fabf15d84886cdef15447e94d8909aac558bbbb5de7714598c1c9b49af11db3e069c44105b0a47090c1b6
-
Filesize
72B
MD5e76f0cbce5865ed6782e8014f6e42358
SHA18b4562763b2f1335166190fd1f06735cd3b791e6
SHA25653d551bfed7d5b6852ce030076d1edfa5c4e27456afb67830d10a473986de948
SHA512873cf6eafd4b17e15ab15f94618ab94413e2552a129fa580b399d10ba6d32cacff4be45255d464c2ea2da6b256673c213a92091c0d53e0338a9d253f80e67d0d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5351ffb7e1033a62f93bc48613b84690d
SHA12fc9646a13a8ef7e2d34631039b951dc3996f01f
SHA2561ff61e6c58a4426dc8d26bb0d29231b38302ec6d92c56c786b362b837786b977
SHA512ec2c18f2a42e19f8ff74e12d870cc2333e702a1a53fa681183f07cf2434f818b7b064a7e2adc66ebc42f988f82ba1fae507df698aba62bbc35a1fcd1e3d4de8b
-
Filesize
1KB
MD5dd317630aca771a0500c0bbb5602f2f9
SHA1fa8208b5503d8691a95cb4d4d4eb86d801477d07
SHA2560027cfc070715e8cb4496df63e5170c6381fc0245e07a35bf918d84b33b6b9d5
SHA512c60af3cf8a706b19523f7d6f4bdbec018b1b7756bc4c4c96d4ed3caa3d11e2ae2c4a5c9df99717236ddb88c5325479bba8f8d39100e3bacc1641d85f35c8cd30
-
Filesize
1KB
MD577e7c312649044602492a2edf4897e3c
SHA143e70b11445cac9c7415da60ef1d46392c6ee6d7
SHA25633b0740888d994b56f2d96106923a3bd845a15b45ebfa01eb0c8f15d893e5af2
SHA512a7dbbbe2eabc6036f9a62a5af89351844445aa1494077960893b6afbfbe7399a9ed04fcd38dd117041c64bdda396877c2971022f5f462b75bffda27218bae6ab
-
Filesize
683B
MD571ae79464fcdafb7d6e066be46b0bb0f
SHA13baa26ea904486616be9213fe05034739a8b9426
SHA256fd47afacf0f64d6bdfc207296ab0b1a3d0c302bb79bc9cb51afe2625b7aacb03
SHA512800428b93767a1f3415325283eae0477bfbe62529bf0fe08487edb9d3a81fc5b0fb0b72a41f43178c27fc8dd7bdc745aa15a42f29c81506ddd7673abd774540f
-
Filesize
1011B
MD53407e25a1f1bb4073f9a14dd923c28bf
SHA13008d5ba9aa1d9dcfc3df79fb89985085802a675
SHA2569c0eb13b0e0aeef5b3df812224390bf25107cf44d1a5895cdd66e4a2c652ed6c
SHA51262766469712f7c8c8306c9393ecd38cd2ff0a816b2f256b1d18917caefae48e74e7045c43b207867c6b2a49db6da5e7326d2859d09710786b4995a2166c20277
-
Filesize
1013B
MD54a99369b55e347ba56f59acaa8b643d8
SHA1142e36ca9e2f00903b086b60678c2b33643e11b2
SHA25692344752e766fa6a2e09b972ffa487ed093733f63c090876f654938de9674770
SHA5127fd6e67ebe696eded58e47fe777b6678d3a1aad9532d4642f1e9ae6ba4df8f12405cd4333d328b25c54488644792e0477eb9ad820c6c9ef698a6abb557103e5b
-
Filesize
361B
MD50748bf3239d665dfc9791b9ac9409fa3
SHA1e691b96ff3e2c532683f49ae382628d70b902eda
SHA25602f7051009e89e7deb1b5ebebe029c7484a4846bb3145d12987f5c184d65be64
SHA512be049e9b3c1f8e6043209117d7dd68d6c9f7045e8629e8cfe645aa7e69f23ae0ab3ec4f8e09fae382d14f5596187f0dcf5aa7ecac163a8e00243dd0a3f796199
-
Filesize
683B
MD5aaa86cae4f95454c703d726aa3f1be61
SHA1913db44a8eee1e9961c0646857b4822b0eab945f
SHA256b4bdbfb8d1e8cf4eee07899b8b8e5e93f81bb6c4ca3a2fc531735e5200c73bb7
SHA51267966be7df58dd670824d2d9b7705293151edc99a2dbb5aab99adec17103e0c9cf6e7542375906ee773735e00dc0c72f06bb8dbac92d4ed2612e1ffcfcf53c06
-
Filesize
7KB
MD55050e01515f5691c76d81e90dbec6485
SHA189d43ee1c490ac790ef9688c626ce9c0a5145ee4
SHA25610ea8dc6cd3830e28d9df3f19988b6a212ead211ea656fd99dace557d05471bb
SHA512556732894c150f465da16123c7d77a99588009688fdad8d4834b5c588b596e44a8bb20e635ded0f2a8679c2d34a92672959fb96ade66e5696c0c74ac9c4de397
-
Filesize
6KB
MD5c47655e6d1d26b7ecd0eda65a8c79932
SHA109867c1caf88a85dc594b084c50cce7ea061623d
SHA2566f7817cc227820257774c28977164e4fbc3e0306b28d4a9c17169eda6c198462
SHA512b8e2174a82f662afe9ef1aac173900dbddba2c8fc345f93db26d2d7e6120ba416780f06cb71fcaf01cf014276ac566d1af287f07085432b79c938df491265421
-
Filesize
5KB
MD5473d559f29df87f4d434b03ab8a104ed
SHA11f5765024d3aec2befb0a6c71665b37f2829f559
SHA256f99ea13d2f79a51e35695748a9ea52fe2af274dc0b42fbcf1c41b2ecaaab2d12
SHA5128734d2093fadce2241ecffaf927279cb21c7b2ea95e60739c05468a4e4cb7df3812e5d48dd84df654f48d0b1747aedf5bde36e492c3c80e4979fdee1585dc038
-
Filesize
6KB
MD5531624ac54a38e5029f0dcca6899e413
SHA110344d7d3ef5ab0011e764e3098b261a89d15b59
SHA256614d104fbac7bce78bcef3a394eb528c6ce9ac3c73a2217483014e1196cbee62
SHA512f37a482d71df20f77f17f063947f36c79e23f1eebfd066156bd70f49c37e403cef181fcbc30f3a8970c1e83c2e179846c1f5d13474fe324b5f2600e8cab8f1a6
-
Filesize
5KB
MD5a2416febc2c6bc566a4f60273cec48a2
SHA1a509dc425fedf9b1610274a39c723904ddabf21f
SHA256ed57647822b4ee46d22a26c0b9ae302ac948e5508248d0435d0f2b9bf1f0c785
SHA5124c45e1e9dea012acaff7f2f041139ad73b6fae80f427a215d1f5f78d2ba3aa7bae179638458c0e5d3173ddc9388506c687c5ad0d310ea7cd6e1fe100636118f5
-
Filesize
6KB
MD5d6ac5e7838edd4f95dd815f5a249c0f8
SHA1367b4aba5bd677fc21486fb85b8d763d6b05a466
SHA256aea3f31362de30a5d43d0e16524f83a4befbc71f6ffe1a18cf5ab65140a68a36
SHA512e06797b8210df1e455a1bbe6b18947e6b4c876d157f69fd5892a30513f92fba433cd3c21fc7aa1875155466e80e2d9c998013466908442e7336bf2ab8d4b34ad
-
Filesize
337KB
MD5b5fdeb7fbf23a2cdb5646f79eefcf1da
SHA185946fd7371c7ddfa2f4da97e4f1036500c47699
SHA2568c65aee732415fd58e9decd33e8449215f8cc3d7f6156ec19654fa9c42f85de9
SHA5125cddbd24d1369e2c03bc0750e53fcb85b90a7cd874a2b219fd2f88c4ced86f30fa49987fff222a77f3fc67ad5fab49e1ed70b48b8f53af65ccfbe3805682e9f8
-
Filesize
337KB
MD5e1e8c59d8046eae4ee67ba77307cece7
SHA173ab947c4a027ff8a26e477e2df14b45d7310f5e
SHA2560ff7312a84bce646e874d5966973ab2d0d938242c55b9e59ef6ee22e4932bc66
SHA51286d47b6e6d7cbf1fbc97f57b5e7694abf3e4dc497f7a5f8f814cfe20ec8811bbdf3d6e000334b1bb120f1399787a67aed7729c794448becc50fe8b5ce5625227
-
Filesize
77KB
MD59203d8beb4b98bcf5b1590beea542fed
SHA1adc3cd98049db177178b5e197a3caab5ef7761c7
SHA2563ae60309349842e9c675846b85d36d6fee8acc95692eb6295237b82c56202918
SHA512587a26ff165d2bb219f51d60a18c0115b7e972674a140b23e81bf8f26b975332f75ddaf846d03b48d3bce169b77c1b8678982dae69b4cdc06d6723951a6277b8
-
Filesize
75KB
MD58cef48f2eb0738469723cd0707e11ce1
SHA137c8add109aadf2da4512083117dceb149e42e5b
SHA2568d16c15d150ab79c45c8d4462d9279cf44b2f4d99768fa6c4e3166007c91c136
SHA512ebf0de3a54c64ad69145f2b1828c7b07d17260d838fdd4a4766de8bbcdb4a266ac6978581ab43c93be3f5b41ff8c3eaa366cc607c4c620cc33026a523562fb93
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87