Analysis
-
max time kernel
72s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2023, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
loquendo.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
loquendo.rar
Resource
win10v2004-20230220-en
General
-
Target
loquendo.rar
-
Size
187.9MB
-
MD5
1f2be91b407d6546cf2e0b5e8725ec9d
-
SHA1
3c24241acef37e67a4d2741d7acd991a3e2068dc
-
SHA256
ad784c32233d6c6fa691aaa6bb61aaf582cce25f12f624ec1f3a2f7653126bcb
-
SHA512
d7cf250a9ff3de6b91d8e5d844d992c9317dd9bb4c70913d730ec2ae226e0d2a49d2edbc05e97c698ded85a8c581749b497b7dc7a926886551698344987dac7a
-
SSDEEP
3145728:5jKMRFuLj0owWdGbnXuygTQ0u3BomrCgDVnqSyI68gLRacLWKXVYqCDXesUi0JPW:Qj0ownj7cPUBoPgxuIQat4SqungMAV+X
Malware Config
Extracted
C:\Program Files\WinRAR\WhatsNew.txt
https
http
http://weirdsgn.com
http://icondesignlab.com
https://rarlab.com/themes/WinRAR_Classic_48x36.theme.rar
https://technet.microsoft.com/en-us/library/security/ms14-064.aspx
http://rarlab.com/vuln_sfx_html2.htm
https://blake2.net
Extracted
C:\Program Files\WinRAR\Rar.txt
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 568 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1828 chrome.exe 1828 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 568 vlc.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: 33 1712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1712 AUDIODG.EXE Token: 33 1712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1712 AUDIODG.EXE Token: 33 568 vlc.exe Token: SeIncBasePriorityPrivilege 568 vlc.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe Token: SeShutdownPrivilege 1828 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 568 vlc.exe 1828 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 568 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1012 1676 cmd.exe 27 PID 1676 wrote to memory of 1012 1676 cmd.exe 27 PID 1676 wrote to memory of 1012 1676 cmd.exe 27 PID 1012 wrote to memory of 568 1012 rundll32.exe 28 PID 1012 wrote to memory of 568 1012 rundll32.exe 28 PID 1012 wrote to memory of 568 1012 rundll32.exe 28 PID 1828 wrote to memory of 1840 1828 chrome.exe 32 PID 1828 wrote to memory of 1840 1828 chrome.exe 32 PID 1828 wrote to memory of 1840 1828 chrome.exe 32 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1696 1828 chrome.exe 34 PID 1828 wrote to memory of 1692 1828 chrome.exe 35 PID 1828 wrote to memory of 1692 1828 chrome.exe 35 PID 1828 wrote to memory of 1692 1828 chrome.exe 35 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36 PID 1828 wrote to memory of 1604 1828 chrome.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\loquendo.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loquendo.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\loquendo.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:568
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefacf9758,0x7fefacf9768,0x7fefacf97782⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1216 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:22⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:12⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3680 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:22⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2456 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:22⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3700 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3968 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3988 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4100 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2304 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4872 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4848 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=712 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1584 --field-trial-handle=1272,i,9558163293306106679,15530170809658756370,131072 /prefetch:82⤵PID:1572
-
-
C:\Users\Admin\Downloads\winrar-x64-621.exe"C:\Users\Admin\Downloads\winrar-x64-621.exe"2⤵PID:2804
-
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup3⤵PID:2272
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:904
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2180
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5e51d9ff73c65b76ccd7cd09aeea99c3c
SHA1d4789310e9b7a4628154f21af9803e88e89e9b1b
SHA2567456f489100ec876062d68d152081167ac00d45194b17af4a8dd53680acfc9bd
SHA51257ab82d4a95d3b5d181c0ec1a1a1de56a4d6c83af5644032ff3af71e9bd8e13051ae274609bda8b336d70a99f2fba17331773694d7e98d4a7635f7b59651b77c
-
Filesize
437KB
MD5cac9723066062383778f37e9d64fd94e
SHA11cd78fc041d733f7eacdd447371c9dec25c7ef2c
SHA256e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad
SHA5122b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59
-
Filesize
437KB
MD5cac9723066062383778f37e9d64fd94e
SHA11cd78fc041d733f7eacdd447371c9dec25c7ef2c
SHA256e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad
SHA5122b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59
-
Filesize
103KB
MD54c88a040b31c4d144b44b0dc68fb2cc8
SHA1bf473f5a5d3d8be6e5870a398212450580f8b37b
SHA2566f1a005a0e5c765fcc68fe15f7ccd18667a6e583980e001ba7181aaaeed442b8
SHA512e7f224a21d7c111b83775c778e6d9fa447e53809e0efd4f3ba99c7d6206036aa3dde9484248b244fb26789467559a40516c8e163d379e84dcf31ac84b4c5d2a8
-
Filesize
317KB
MD5381eae01a2241b8a4738b3c64649fbc0
SHA1cc5944fde68ed622ebee2da9412534e5a44a7c9a
SHA256ad58f39f5d429b5a3726c4a8ee5ccada86d24273eebf2f6072ad1fb61ea82d6e
SHA512f7a8903ea38f2b62d6fa2cc755e0d972a14d00a2e1047e6e983902eff1d3a6bca98327c2b8ed47e46435d1156816e4b0d494726fce87b6cbe7722f5249889b88
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ce54ea9276567cceabc9439e711692
SHA1fdbd0cd9a8e2b51de4fa3b00002f79978f6cb0c7
SHA25648d5582358e6987149a45441122a9e8def8c4c94afee16b2e41a59a6239c7c1b
SHA512e291f6f02cc7e2a7189e6bd346c04b443a51727ac75a425e23c0aaf0fe78cb3122894ebf6d1046baf2cb694ce2bb23c01fec42fc92ecc6b02e489dff4bacd96d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\274fad9b-6bfa-49ae-b0fc-67729c387e9a.tmp
Filesize5KB
MD51818a5e9a7f915083357fc8056dcfbd0
SHA1b8ebd86b139f64e533dbb6dd1649b68159b225ed
SHA256883908f3557cd3ab7a06a30043bd894d13135a3d933e2aa451b53033a4deffd0
SHA512ffded87c60832d05813fb24bb1eabbf448ae6a016b436da36818dbdb7eba06b8dfd9182b9ab1773ffe42298d2f4df71e426d6dd19f5c63ca11cf716458cda0ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3af867bc-9993-4867-85f8-920a9a22c892.tmp
Filesize5KB
MD51f22f622cddbc7482b72680bb600240c
SHA10957b041955446343ec8a0bf25eecc9c6fe7a1ec
SHA256e21b39c85e0007a5d3287d61d2f4dbc7502d51bfefc5b3f3100568970d75890e
SHA51216b2001daf78408d34acb37f5efdb8206ee04c86a3f6ea8e908d45c3ff7bbffb5aa13f4dfd3b7818b4477674114acb6d93f58e5f6db7872d24b9557a06ccd78b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
852B
MD5c1ea48ef73e538b6b717d3720a26279c
SHA1cee1fa71752a80cc2c7827f5210bec79bc4b51a3
SHA256a5a4438d962960804b684dbede784d059b30efaf03ec0821185eb16b8c4854fc
SHA512338675b235a54520e8657fd6cdabfb0fa192f58fc15a1bd0fa802ee28975afda9027cdf8dc32771efa8b9c6918ef3322c8dcc999bb6076b9609602edfada4971
-
Filesize
852B
MD5f7fa90112abc45da2035237634615455
SHA142cda6fad72768af03021661bc3d7a202968dc6a
SHA2568ce28a7f595113cfaf5248107ab3e8da57d101181f18ae0ad8da7598dba87a44
SHA5126bfdeeb766a87a53909b120ef42e5128b822e6886c26013bd1b5460fa37c15f94b4113b565b1dfa902da387a460d56f25087b89976c2082043090a8cacad77b6
-
Filesize
4KB
MD5d690712391f2744bd81e8fb1303d4ad7
SHA118247f9e8c96b931b8699a7fd91098f090085792
SHA256f3c5a579da5ca6f56c82cc0fe89aa1c10a2cfe944392fc6793d7716cc7926de6
SHA512e8d04f515721c5a40281cae8f7347ba148138b70ddd4fafaec4a7e3b933ff71c8885d86ef8922a0b491a5b4ceadd84da6a4f5819785e763a3bc2d86123a641ae
-
Filesize
4KB
MD5fc79cde7d69117310a1d3fde0b4f920e
SHA1cff81f872203b0ef6f899a35fd2a3d4f239a6a38
SHA2566f9f78cf8cf9abe1d0815add6a1fd1af7b87c7189897d7535d8166d32572213a
SHA5125fedb99033257bdda598ed4281e30ad15a1e73b427ab00f011834479cbe7ce8d377d7d1e1df49123de3cc45d7ff8e6a3ac972e6ae64a74aaa29dbdb3c18bcb2c
-
Filesize
4KB
MD5421382a66bc94d8b03f6cadad66b884d
SHA17aa9a86e9a02768b9aef75547a32f0f37a63ded0
SHA2566d871dc7c82b1249501e3e42ee4c649e9f711dd2e6caa1b229484609f5ec3115
SHA512c9b2e7a9edccb2793327d965184d6dab96efbdfae2e9d7ac2bebba315492491a20f9e32d1c9da758ffc9c24245698cda75cb2db2f797e8a2e8d9255c303aa965
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
85B
MD5fee50bf8695890b3d7c4055e6147e762
SHA13cc94e1edddb1244d44521b4f0a763ddd339fcfc
SHA256d518d52d8775565c59eb8b64be8f5abb40fa90f40497705921643781390d64fc
SHA512f34debfe4b9946088073389f4706d454e1d88483f75df81a440c1507adfc93ca44985dcedbf0bb4cab999f5485f9601e2b228acd12f474fd9c9411511dae3818
-
Filesize
93KB
MD5478a4a09f4f74e97335cd4d5e9da7ab5
SHA13c4f1dc52a293f079095d0b0370428ec8e8f9315
SHA256884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974
SHA512e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608
-
Filesize
437KB
MD5cac9723066062383778f37e9d64fd94e
SHA11cd78fc041d733f7eacdd447371c9dec25c7ef2c
SHA256e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad
SHA5122b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59
-
Filesize
437KB
MD5cac9723066062383778f37e9d64fd94e
SHA11cd78fc041d733f7eacdd447371c9dec25c7ef2c
SHA256e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad
SHA5122b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59
-
Filesize
437KB
MD5cac9723066062383778f37e9d64fd94e
SHA11cd78fc041d733f7eacdd447371c9dec25c7ef2c
SHA256e187e1119350caa3aec9d531989f60452d0198368f19cf65ffd2194a8a4003ad
SHA5122b3dc50fb5006f1f3beec1774d0927a0533b49d20122e49a0b4b41840f83c494376c8e61da735aa58d27453c44450203d5c2bb4f03fdd37b648ee0f51f925c59
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
2.4MB
MD546d15a70619d5e68415c8f22d5c81555
SHA112ec96e89b0fd38c469546042e30452b070e337f
SHA2562e503ad5a9c800f2dac2fed2b3e8698d96d25b219ed86ed1a54896232cbe4781
SHA51209446dc9d0c768844213f7f71ba65ee4e86b61d7a61610b63892d1b142952bdd346d14d27d878c026362e012e22fcb49c6746912d5e02db6b40223cafa6d01fb
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608
-
Filesize
3.4MB
MD5766ac70b840c029689d3c065712cf46e
SHA1e54f4628076d81b36de97b01c098a2e7ba123663
SHA25606d6ecc5f9d88636b0bac62218c296bfa1b2222f734c9cbed5575bd9f634e219
SHA51249064dc2c30eecd7320a6431abfee49d250ea7cda5e8ae630d2c55325f5bdf338355ae8d7a3246b4036afce5c100b8b30599baf19ab64d20190392d2d9a28608