Overview
overview
10Static
static
3CLibrary.dll
windows7-x64
8CLibrary.dll
windows10-2004-x64
1CheatInjector.exe
windows7-x64
5CheatInjector.exe
windows10-2004-x64
10bearer/libn.dll
windows7-x64
1bearer/libn.dll
windows10-2004-x64
1bearer/qge...er.dll
windows7-x64
1bearer/qge...er.dll
windows10-2004-x64
1bearer/qna...er.dll
windows7-x64
1bearer/qna...er.dll
windows10-2004-x64
1dll/Qt5Network.dll
windows7-x64
1dll/Qt5Network.dll
windows10-2004-x64
1dll/Qt5Svg.dll
windows7-x64
1dll/Qt5Svg.dll
windows10-2004-x64
1dll/libEGL.dll
windows7-x64
1dll/libEGL.dll
windows10-2004-x64
1dll/libGLESV2.dll
windows7-x64
1dll/libGLESV2.dll
windows10-2004-x64
1dll/libeay32.dll
windows7-x64
1dll/libeay32.dll
windows10-2004-x64
1dll/msvcp120.dll
windows7-x64
3dll/msvcp120.dll
windows10-2004-x64
3dll/msvcr120.dll
windows7-x64
3dll/msvcr120.dll
windows10-2004-x64
3dll/ssleay32.dll
windows7-x64
1dll/ssleay32.dll
windows10-2004-x64
1iconengine...on.dll
windows7-x64
1iconengine...on.dll
windows10-2004-x64
1Analysis
-
max time kernel
63s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
CLibrary.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
CLibrary.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
CheatInjector.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
CheatInjector.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
bearer/libn.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
bearer/libn.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
bearer/qgenericbearer.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
bearer/qgenericbearer.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
bearer/qnativewifibearer.dll
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
bearer/qnativewifibearer.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
dll/Qt5Network.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
dll/Qt5Network.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
dll/Qt5Svg.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
dll/Qt5Svg.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
dll/libEGL.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
dll/libEGL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
dll/libGLESV2.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
dll/libGLESV2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
dll/libeay32.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
dll/libeay32.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
dll/msvcp120.dll
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
dll/msvcp120.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
dll/msvcr120.dll
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
dll/msvcr120.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
dll/ssleay32.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
dll/ssleay32.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
iconengines/qsvgicon.dll
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
iconengines/qsvgicon.dll
Resource
win10v2004-20240508-en
General
-
Target
CheatInjector.exe
-
Size
12.0MB
-
MD5
ffd54dd853ba501a846bcb20b8fb8a92
-
SHA1
167e0a2d7fcb110df4d5561cfb0aa86e67784f4e
-
SHA256
bc668cbc597c7b00abca9b6ead346889cee9c8de235534bff296417a077df999
-
SHA512
eedb05f9e7a260004a53b6196401e878c8f2d2f1c47e280dc5bbca245771417fae7ffea1201ccdf1ab56a6998e0acdf2ee7e39538ea91e056f91811e2e253f6f
-
SSDEEP
98304:qTTm3vPx378D4xKKpmULiOSnP7REM+aweRMEz:5Pp8D40/UuO0P7yM+M
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
CheatInjector.exedescription pid process target process PID 1436 set thread context of 3016 1436 CheatInjector.exe BitLockerToGo.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2636 chrome.exe 2636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
Processes:
chrome.exepid process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exepid process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CheatInjector.exechrome.exedescription pid process target process PID 1436 wrote to memory of 3016 1436 CheatInjector.exe BitLockerToGo.exe PID 1436 wrote to memory of 3016 1436 CheatInjector.exe BitLockerToGo.exe PID 1436 wrote to memory of 3016 1436 CheatInjector.exe BitLockerToGo.exe PID 1436 wrote to memory of 3016 1436 CheatInjector.exe BitLockerToGo.exe PID 1436 wrote to memory of 3016 1436 CheatInjector.exe BitLockerToGo.exe PID 1436 wrote to memory of 3016 1436 CheatInjector.exe BitLockerToGo.exe PID 2636 wrote to memory of 2696 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2696 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2696 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2504 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2552 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2552 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2552 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe PID 2636 wrote to memory of 2956 2636 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatInjector.exe"C:\Users\Admin\AppData\Local\Temp\CheatInjector.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e69758,0x7fef6e69768,0x7fef6e697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1176 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3112 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3564 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3920 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3992 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3768 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3412 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3636 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1644 --field-trial-handle=1240,i,2305601337559871775,9757006623782312927,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\86c938db-8817-4ca0-8c55-5d8c2cf261a7.tmpFilesize
290KB
MD56e26f12bb1fc2dc0ff697c14bd268405
SHA1128b26fd95d3ef881e7fcc42ef2f9ba05b7ff13b
SHA2568b52bdf115647dfaa9ca5df25e12aeb25fac9f13c2da30ca6a7cd37bb89f5597
SHA5126c3d558a1aab0939241920277a310242bbbe2b21819cf5cc89a21c4b0beec886cb5efacead91d1a9215a22a1e21dd13ab754369e23d1a11898f7d4de1acff902
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000013Filesize
47KB
MD51af625b5988f4098155457b42c9e7604
SHA1f101a2737ad079176c92bc2684f8961b074ad710
SHA25644d44ea3935d534f44d0e33117954cadb08b712269e12e10093755e3d4885014
SHA512b81654c38578ee6acb3ef12ced4fb5edaeb698add94d68a6745db933582494170ac6a048022eeb2dd734372232673f7ed50102fc8fc3094e3804110b20172d39
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000016Filesize
225KB
MD5d115c0a2800145c06e066875ba331616
SHA1b94c5f0d25110782e939d1234141b70e6b238653
SHA256113e69d83de21cf11879632723c532d28df10a53c0c2cffb663190f82c50570e
SHA5122bd24181e53bce956c5262bcc641c323ec077f5a19193fc56a74d3704eb1f4d76b47076d1654c69cb53ddb9a93bb880ed49fa0ccaf46321723da6cfa99c4522f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000019Filesize
32KB
MD5a37cb5b2be3ac24f85e18e0f6af90e18
SHA17888cab4667f8997bee7cfe1357b6d090e5f987b
SHA25638322e4056896c3d332335130caef7ebf6f02a9e902e87adeb3141aaaefc5eb1
SHA512f2772d825de479756299954d0d6b67c3c940e41a2e2329a733e755b8b3d107c53fbf845d64330ae9b75f75f56f872b9f6fbcefacb55606a0ae7fda58eab6b384
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001aFilesize
23KB
MD57ef4c868940474e95ff7cd16af7d6094
SHA1097edf552efc7f1ca4385da8f1312ee9047d9a3a
SHA256949fa6feeb661f52de6cd85cd5ab44e315a8a8d22c48e1bf7f630e37dd9a9223
SHA512730754efbb62a0a6886ede62f2daedaabd6230a4611e26e72b4c84dfbecefc8099b30e11c03debf76eef15df6de2f57e518ac77f1763fff734b123c0e22b33e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001bFilesize
32KB
MD5fe0cb11576905a924b316b72b715c2e3
SHA131a833346d235602a4fc51b49ef9bf57d9d1409f
SHA256ee9fdfd767036158d8d3bc22f6c3095c5bfa6c17d4611eaacd45a5a829a864b9
SHA5120227816287e01021bc07b84db89642ed0cc5e1c3a653a8be2c38bc53dcb17cd62b1a45051cf143ba9c2a5880df961d281192547fbb0788d95659ec5169e98ac4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001dFilesize
19KB
MD50e598b4e0838f1540edaaa0ebf6d1e68
SHA1a69cc56bc59a19d8e0da1b74db64b0f6c319e095
SHA2564ed8eeb9c3e8abd8a3ae9a6e4a0da56d3bb513938555795256d73cbd578bbe17
SHA5124a00bd10f567a45b9a3332a50803002f4a089bc38b065657e2a921d505c0a10c4275add2d6c9b4c3ea6a5ba87ccff47140aad0222bef3fceac331de97cb1f273
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001eFilesize
34KB
MD5367d6749aabc56bcfd8fe6f68e8ec07f
SHA194603bfd837a6cc48b0b413d97e6c21294139f01
SHA256aba7125a597cbea4846b275de47b9e35fb42202d217c321ad861b09d3b831b5b
SHA512737b43474c49d945fcc767a082ae79734333de55374c35825993539376577af76175a966e633b8224b4ede6a42738f3298e5c42d7a307f37897857c7c65842c7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmpFilesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf76eba6.TMPFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5dd516d2bbb52a31c8d585e8d42e1e2e2
SHA1e6ef50a2a02432d14bbe493551e7badeaafaa782
SHA2565421b88d0fb8714cdd62a7f8c57ddd129a14c65eee11a5b3567639828ec56db0
SHA512d0cdbe2db22589cc4587a08fa0604b804c52ce0ad072df3d0dd353d30497bf111e3e6fcca186fbd0292b1d0b030e57ffa6e40a34369c090bf01661b790e224a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
855B
MD5903056262219b02e15913b4f87b1d04f
SHA16e3887730a78dafbada404d8a3054c7b16bfc869
SHA2562aa1f25d28b4e2f79f540856e6c1ebfc26aa774d411b6cd945eaa65076569a3b
SHA5129c65f2b628f89c34b7d3dbb36cbbb68c2f51de54b3783a3e22a96af69628864b9bbf950d076f7fc65609e866788552322362fac8f6c312fd18002bc689700897
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1018B
MD52d408cb8818a3e68833e1f4bb563314b
SHA134422e91f8be8c7d987892e37a620daf98dd7668
SHA25634736445ab7319ec761fd41b2226aea5f02c3855989ceb62b220c734d976ad58
SHA512a4cd162a4923b6224b7755521d456663d1d35ca3f033f9069683c8a7db1d0801a8ddbe5145c4aec164be14a2e0d95e6ac1c07e79705cc2e21cbbc3aa8dfe56ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5be6b3c6ce46eb586613cf2d66a6f1c2c
SHA182322dc41857e5087efa964ce74425a4fbdd36da
SHA2560e8503185cad83b01a82572c8b24e0c318624129dd9593326190fa9adff64767
SHA512912c6a12c3f3d379994e010d14d63a3a81897a4a3e06df77b59826b40a4aa9918bd003b7b3f199ea7bf00e914207b46fcf06ff070b09b88cc9461fe0ff589b0c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD570b8007819ddecf417bc2dd9f10a5929
SHA18376b65cb49ffb1df9c312757bf0843e05781889
SHA256685d89c9f364cd3458350ee7f8a8d52fc952dbb15f16ec4aa1bed29c27cb197e
SHA512a21fd00247325405de8b12f56c5d94d7478c16a0fabf2ae83dcdebf698c5e1695e43237ffc067072c39924829c71e452dadf4d066f12887f86d17046893f922b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD52fd33e2a6a73029a8d3c45a144d1c1fc
SHA1b5d87072d6d8e5456223b76c0562765795a9d55e
SHA2563159560839f621f704ae781eb6954a4c179239c9082fcb1a45c93767e15250d6
SHA5124e32083093330df137c7b1159f59ea6593da4cf7ac8bdaafb83a7f782e35892ff3a9220be1b6639828c47368014b957345643776adfdd8e6d2d2149b2a2a7872
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\91d6d736-cccb-4341-ab04-9df4644c57a2\index-dir\the-real-indexFilesize
2KB
MD51322f416442485edf4f67ac475046ef8
SHA127334af9088adfa5b09c757ef4e5ebc482a1c0e2
SHA256256eed57d1c0eddaa50526af50ca301726c3136873b35f12120f16ec371bf127
SHA512cd9e958f3ef0fafabc04bd418576bb386070f1a2a71397eef64c6192a40fc8ef153344992257c60e7822c9ec6bdc65a5a4f5666d0a06f0f49fa15b11e49d49d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b3d4eb87-fbc1-4c24-bf8a-ab7266822207\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
176B
MD5fef17163f1c03672d08f0876d892bd41
SHA119ab151b31a7e32403e18eb3a6701f7d57c3f1b8
SHA25698a612752888452f45cadfb1db0fb552fb9f8f469745d6b2380e2dc9ef0f4e50
SHA5129e225a28ead1355806247bff7cb91c8ba13c23c09bddbbbdccf25f408029f674b50912a338f8d12c85ad9fbb9e120a6e7c070243a05e1f75d8a33e06dca400ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
178B
MD57ac11a96df3da794cd98c95d274cdb59
SHA178e71126a503cb7bb332755254f04a6b632af296
SHA2568cd08c47c832d9bacd7589eea7fe1e248eae41e661627594d632e72f4899445c
SHA512dcc790d567f41b0d630d2e9d160783254d7ad6bab80d4b385f5b89beb31c03bc39670022d70d97ce7b5261ba8d00cbb14677ff74113bd1c8622884bb00243ec6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
112B
MD5c5ede3d3a849965b8497c021146add67
SHA15da6153c23b0a9dca61c965f6bbc9fc79cd6d54f
SHA256c6f0c36fb9f17cbab8d6a6c8a3973a4d4d1efd1f2dd07cb5c0a25def76214df5
SHA512790d2e9cc0786f72c3a3d9ac1376baa054ec50a321da9583ebc826839c9562e2d0368e97c8f9f00b46c383f08e92f6a86355d12be56d252583a1a68a63f08fe7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
114B
MD598ad1b575462924f57339522f400324e
SHA18a9cde21286155fd1f93f313369e5fcbc8c1ab73
SHA256455f35dea12724eb529ccb25d801ea59499ba8a614c45b64734f9c6935909e51
SHA51240bfe7f9c5d7cb4c36da676d04b4949cab857d7e4e0ac371bb421bcd29752c17944ef8591a9c0315a07d09629d5ae7439d3ce893634afe3cafa7ab6694429eeb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
247B
MD5d1f8d869c1340ce298efedeb6a605e85
SHA179f66d59be9e9e85000e2b39e4bd89299e6416e3
SHA256c8e04b8ec9f75c4ce931b1bcbdf065b7df9d0c37e0631f431a48313b5777f6b2
SHA5127a5ec16ddc4c61a1d9cf109d3a0e91fac4ffbf7da5e17af5b91b5235a533c2f9f8c81179d7281d2416526078f8a34c43d0bbce1af4b3abb1007315cb30c00deb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
187B
MD5a9a8c7a2e038ef393075be6da6e6b24f
SHA1fce69155b738b88e9e192b1015929aea79c5cb9d
SHA256a10a1b7544ebed721ff17fda24e64554317557e50a5883e6ce16d9701e340000
SHA512094db14b1e9c47bd77d9222c032dcfba8918d55c3b1648ad805e9eba7add3eb00d9602407d0d6a724c32987b15e2f0eaf3e674a4c39d9c243b97212461a9ddd9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\000002.dbtmpFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Shortcuts Menu Icons\Monochrome\1\512.pngFilesize
10KB
MD57f57c509f12aaae2c269646db7fde6e8
SHA1969d8c0e3d9140f843f36ccf2974b112ad7afc07
SHA2561d5c9f67fe93f9fcc1a1b61ebc35bda8f98f1261e5005ae37af71f42aab1d90f
SHA5123503a0f4939bed9e1fd5e086b17d6de1063220dffdab2d2373aa9582a2454a9d8f18c1be74442f4e597bdba796d2d69220bd9e6be632a15367225b804187ea18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir2636_711913293\Shortcuts Menu Icons\0\512.pngFilesize
2KB
MD512a429f9782bcff446dc1089b68d44ee
SHA1e41e5a1a4f2950a7f2da8be77ca26a66da7093b9
SHA256e1d7407b07c40b5436d78db1077a16fbf75d49e32f3cbd01187b5eaaa10f1e37
SHA5121da99c5278a589972a1d711d694890f4fd4ec4e56f83781ab9dee91ba99530a7f90d969588fa24dce24b094a28bdecbea80328cee862031a8b289f3e4f38ce7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
290KB
MD5530e4069940c4139dc8595e42e489f0c
SHA1aadd63101c4224962025431dea6d6c0fda7f7e83
SHA2568f5edc0a44cf9e430b5f9726270740c8bb33768fa60010a0f861619efa22881e
SHA5129b84e893652e35bd7cb535963c3d3fe720b7cefe6b7bafb16b98615fa7a3508184d90516a3c5867d0aebf94e7f606a862079cb37fffd6c2313511af96e4b83d1
-
\??\pipe\crashpad_2636_FFGADXVBMBJTGSVQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1436-9-0x000000013FA50000-0x00000001406C3000-memory.dmpFilesize
12.4MB
-
memory/1436-2-0x000000013FA50000-0x00000001406C3000-memory.dmpFilesize
12.4MB
-
memory/3016-5-0x0000000000080000-0x00000000000D7000-memory.dmpFilesize
348KB
-
memory/3016-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/3016-7-0x0000000000080000-0x00000000000D7000-memory.dmpFilesize
348KB
-
memory/3016-11-0x0000000000080000-0x00000000000D7000-memory.dmpFilesize
348KB
-
memory/3016-12-0x0000000000080000-0x00000000000D7000-memory.dmpFilesize
348KB