Analysis
-
max time kernel
76s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/03/2023, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
DiscordCanarySetup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DiscordCanarySetup.exe
Resource
win10v2004-20230220-en
General
-
Target
DiscordCanarySetup.exe
-
Size
91.8MB
-
MD5
a1ccac47c91a01e3e9fe78e6a56114c6
-
SHA1
7395ccb39aeb600933255ca4de4158aee709e8c1
-
SHA256
e7e604101e3c3915c7b713b0ac9f6069148e7bf9bc55b39a534cb50f8ab561a5
-
SHA512
1819a70b17fed9f9c7911e923d1f1fa028bd732bcde7f290a864a1613c1f452ac60c19e5bef544e531b55b1c15243e5d5e6f11a0c121c50b76ac5c6d8260bf36
-
SSDEEP
1572864:WZ+C2R1+zaR5icdUOpF+125ggSKhQMGCBjz61j4TI9qOb0OBcJAccEzf7:xXuk5i+pSGdrBj2h7oOchf7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 Update.exe -
Loads dropped DLL 1 IoCs
pid Process 1808 DiscordCanarySetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1308 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 436 chrome.exe 436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 900 taskmgr.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2028 Update.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 2028 1808 DiscordCanarySetup.exe 28 PID 1808 wrote to memory of 1308 1808 DiscordCanarySetup.exe 29 PID 1808 wrote to memory of 1308 1808 DiscordCanarySetup.exe 29 PID 1808 wrote to memory of 1308 1808 DiscordCanarySetup.exe 29 PID 1808 wrote to memory of 1308 1808 DiscordCanarySetup.exe 29 PID 1356 wrote to memory of 580 1356 cmd.exe 33 PID 1356 wrote to memory of 580 1356 cmd.exe 33 PID 1356 wrote to memory of 580 1356 cmd.exe 33 PID 436 wrote to memory of 1524 436 chrome.exe 35 PID 436 wrote to memory of 1524 436 chrome.exe 35 PID 436 wrote to memory of 1524 436 chrome.exe 35 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 520 436 chrome.exe 37 PID 436 wrote to memory of 540 436 chrome.exe 38 PID 436 wrote to memory of 540 436 chrome.exe 38 PID 436 wrote to memory of 540 436 chrome.exe 38 PID 436 wrote to memory of 1676 436 chrome.exe 39 PID 436 wrote to memory of 1676 436 chrome.exe 39 PID 436 wrote to memory of 1676 436 chrome.exe 39 PID 436 wrote to memory of 1676 436 chrome.exe 39 PID 436 wrote to memory of 1676 436 chrome.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordCanarySetup.exe"C:\Users\Admin\AppData\Local\Temp\DiscordCanarySetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2028
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\SquirrelTemp\SquirrelSetup.log2⤵
- Opens file in notepad (likely ransom note)
PID:1308
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:900
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\TRACERT.EXEtracert 1.1.1.12⤵PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6109758,0x7fef6109768,0x7fef61097782⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:22⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1420 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1660 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1328 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:22⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1472 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1408 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3948 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4152 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4528 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4808 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2656 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1136 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4156 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2332 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5088 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1924 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5116 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4620 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5484 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5736 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5860 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5988 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6548 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6568 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1208 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=3484 --field-trial-handle=1256,i,1118215345160054105,2002906109436563667,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:544
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde1⤵PID:2916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767fdb675026693880e99aab897041ad
SHA18626df48b4d2b48b40f2b1a03b130e4bebef892c
SHA256c858a21ad34f66e56bcbc9f9a870ffff40c6941b0d5867baed758a2cc92669dd
SHA51222fc34356bfc0bb42d8ab407ad0c45a4d8cb9b5f8fe7ee6d64c380bea08deecee7d164d9f6a08db4d2a80d1874841b5db018a99ad0aabd79b289cad7f44b2ab1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\03a6e964-1f86-45e2-87ae-8e2b12ae34ca.tmp
Filesize4KB
MD5fe55891a0f8276f10be0117189dc9ef2
SHA16d2c66e049b178097adfea9fd635a6ad49495b8c
SHA2564227d39cb35b65eaab58668a617b6fb8e7cdc7a778218355e1268c7fa0918a05
SHA512cae5acd21444de1c41497e256800b623bf6cdd8fa5522ec9f8a55eb9e2eaae6ed496aa3821d9a19b6e3ae682335eedf86e4a429e7b59af95a555f3058dd5c58a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0d265a2c-5049-4bc4-a263-7294fc243481.tmp
Filesize7KB
MD53e54dac2635357d80d704e1db2f51da5
SHA16bf11f89e0068070e964c8ee8c0da97da3362d7c
SHA2565c8efe02cc907d1015e494da725a4b3abed41b03cb98cb20474e01a8a76be835
SHA5120258cae5b2847348d1ec846b17566a170ef3eaccbc34116c2257f5b08277f165f05d838bf74b0dbab49067dcbad77af51d1a0b94cf62390a62f701aceeed624f
-
Filesize
47KB
MD5a1527b679f4e2808555b49e7d3dd9290
SHA1667128343a768373c5bb305db960d9e684a10329
SHA2568d024bbd9ca07f206a8432c16796c1a7d896658fc5244c4874df5408a998a78a
SHA512fbc8e0e643e89ab520350265d87ae41a1e59549c997a20cce57249c18c9ecaf774843b8b12634a9ba8463c9954c18181bc9f8b95db984bcb2992da9e73ddc4d0
-
Filesize
37KB
MD5d90cb261f4a509d886611473296e188e
SHA123551f9039c8b855b496f017c8f75b32f6e56671
SHA256ca6c7cdd1e68e9f251fbf58e0b0ad9e883b38979e264c3cf4125f603b21c8bb4
SHA5121cca6c9490c8f7adca7441ffea3e7445309d0c52fbaf7252e4c3c73525e00233a8173536c031747a55343bb86e96618d9c96afc6e4f8d25b0106729cca5c8031
-
Filesize
936B
MD5f65d4c6d7cc1af00116782798d887f6a
SHA1c193e2d43c0050a29a993b5de2514a5e5295d021
SHA2560901436e94c07687f81658202447961fb7812684f03075db8ce01e998c677502
SHA512801e07a8a50d5ac5aa2aefcc3a1d588d0bfaa5d53fb5bac1e329e4f38aaad81626cfd0976ed321729f833f9d51afba5884d8f981fc502c6a1460d6db0025de8b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6e4616.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD51f92f406afb46d65566e124de06675a6
SHA1054720d01da49a922e20b1115e19aeb2d3b9e03a
SHA25610c5f813e5d899bae72db365b180f85c6768c44688fa5b85db12765ae4e92ea4
SHA512a82e0619e37e24c11d1e817630b19cd6fb2902e1c40c407c28117135394228158b4b17ef3dc7322feafd6f42dd2a8c4f7079108de1fb4ac6d0335786a22779ca
-
Filesize
1KB
MD5e0942600c4485af72ded5a753511402d
SHA18ba972431b0aa4576cb88729db468792fc528368
SHA256474fb794b9c40498700aa4a4d2fb8a0fd6418b42f4bdb6a6653e98fc6cba222f
SHA512d20db43f54eac0a943b9df63422a9d0d6fad54a1798b965843bd2a03463b6895f82cce8e5be9a3c2fbc899b5cb9d26112973badcf9b1f18d2ba06b257cdd7e2d
-
Filesize
527B
MD5e4bd68cf01ff4ae2ea435e3a80abb3e2
SHA163b6986c505a2abf3d1ea44e172df49a9ac26b43
SHA2563f9c3c8dbdd0f6900a8211750ca1bd146088ef51c326d1333d6c745330a9a840
SHA51209334dd2e227cc3d87aa40a3f5ef4e7d3759641197285e4a6b01cc47a8f203905a1bc15ec093da1ca92707e939ee3a286cb606f1a69fc39796b3f7e31b1a0a9c
-
Filesize
691B
MD5b6f5c5c4f1e4898ffea3b5a3d1b50bf9
SHA1a185a22c478b0592dccc4e75b394f1cc6cabda96
SHA25665321dc966028cf5afe0ade589941a69927f54cbf389ba1087fcbe4da27814f5
SHA51284933211a0f42dffe0d3fddd2e6e5486ce9f83e224fb0464146fd7b0ffe3d63b72ab9ad87db40bba2380d65c7820a735a9c99b35b62c9255eb56c6731760dc92
-
Filesize
1KB
MD5f62e3de41842e919fc854fb8c5050437
SHA185ddf7ccf8a883be544de35bf6e12d4d54665313
SHA256a7dd5f6858d2134165118f0d24003235f6f4391cd1a2f52d26a8953e46f8f8ba
SHA512f18078ad9bc92371937532911e3253d4aac038ae4ab1be65c2bc5f378b4e37e25e95f2a989805bce13e3879d125dca88a40a99666d985834801926183ab27841
-
Filesize
4KB
MD50a9d8da1849cd7eb03e588729dc4abc0
SHA10aecf84de0c4fe6170a6bfbb413c70b511d4eb53
SHA256a8122c91032cf5be56bd1ec2a5f49eb705e0004b6cb835fa86c01bffa5286e71
SHA512162bb12aec9b287a1be28d7bc995ea897e187e746ca33cc293a837f50f2b15f69242a841ba833d4f7bb700fa1fbb03a5dc0dca01bcbe2c9b7f2b49f190b1ef29
-
Filesize
4KB
MD5c77c9439bb50f46d8109a8621ba5f6ff
SHA12850b4f6b2afa6f88d598f925b0e9dd9d0c86417
SHA2563db55075ae79bf0d9946bd4c11e054a138c439271c6bc4362125bc0e2abda19a
SHA512f1a64fea726d016d1903fb0166830287a879dea9469a20beaccdb6ae717ef315720c015099abb6a988ac3d56cee99e8b1aa8d5b62b88c2328155f84be4ef97fa
-
Filesize
7KB
MD566989ab2378e9a9376cd40f3a04059e2
SHA11e3c977d7b471b937722bbc292627c04093f831f
SHA25659e6f5c1f3735273819da5362f1b6ad99199b1e4adca05b526f65286b4e0ca67
SHA5128dcd92dd8d2899d597ba5c6753e12ce2cd91ec7010abf79ac90d9a03b430e250898be7e5eadf1e0be3b798c8cca57bc3bb5c4143b970437704d2965be4ce2d91
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
143KB
MD53b0807a1a54e38ad53ecea7c0084e705
SHA124a21a230a4ca14bdb744ba428159831b417202f
SHA256a0836259db883761574feab2ab3a540716e27753c948652996246bdfdbd8f131
SHA5122e3ad3b50bf295fef0d41b6c0572672c136da9cc92bc4a8ffab000aed0893b95f9ae7879f73807849e93595d5dd163f0bf48c7e7251695e70b6aeb1742a94d3c
-
Filesize
143KB
MD5d65f8d76dd8118e88c572382886ca0ad
SHA1fc775297396f3fe39f94f45d41a706aa60016ac2
SHA256789f3dc648b48c3e3245ace3a58cf6bdaa1a0839a291a3b95aac79a09e0e57f7
SHA5121b332195c448cea5cdcbb9a22fa044d8d12897f8f89fa5a199e16304e572e0a4395d1b47fe41fae2def381cd4e13f5ac42b04748857fb513cbe1db785174b749
-
Filesize
143KB
MD518e2771b415a1ff765bf6fbfb56bb6fb
SHA14e5e24505cb86a72060d4452ff971908a9d997f9
SHA2566ff89334d01359a2b606b8d4b8a8befffbc0d81e409a86e7d97124a3bb37bb72
SHA512a70ba48dbbed0e08f1f334af96392b23a9b958ff72c06db9cf31d3ba6490a977f5ddcefa3163a70a0bd21a28fa7fdb08e437aa273be5fd66703fcbe5d7aaba2d
-
Filesize
143KB
MD5fcdec50498cfb6664d3defc8618bcf3f
SHA1618837b1713f562a542f0346157f32d3b42ff190
SHA2566d0dd19211ad9b308336037596f29a4bc817e4520060d92f162882d1885df5b1
SHA51250e5a7180bcaa553057f3056f285ec76963d177197fd8d0a4b6d02099c62c881dfacba5ba602ecaa8100ae60d6ea3a50200b2a34c30d4393a92659cfcced8798
-
Filesize
90.9MB
MD55be428f25a23462c86626646d72e91a6
SHA1814b251c8428733a518f2f1799ffa0c71cda9708
SHA2568d8a1aab54449a1870bcf5cdd806f7472034091b30ff67ed6834d13728a83c9c
SHA5120680bd468b80f91e42390b0579946fa25886d5e48da72786b2a38b7fcd5aeef6a9c19a57673e2dbb0dfabba7671010abd8d1872ed5ed05e8636657b0c3b70f53
-
Filesize
84B
MD5e901a3122de45420dc1ee0546f94df5c
SHA11b65db554712c48c057359dc0dfa37c7d3a2840c
SHA256f508edad9b96507644974436cab397b2c2bd79a096d7c901d1eb8e014bc076fc
SHA5122420e89be6f95ee53e80630ef74f78ac4d01afcbb29ede29c0f0f98212f0dcb6e5dd8589287398cb54151ea9e1795dc39ff49ca016a19bf0f1a130f3715b051f
-
Filesize
11KB
MD5fa76c4d902a0ba814303950cca7b33a0
SHA14689c9fe2b4241c0092dd2680cfeff703e44ad4e
SHA256fc539343205da716a14984912d378c207219ef6229e990739e3eac6369d4c47a
SHA512d7c9452076bfdd2b63ba7c5841ea8ea36ca359987e745a648fcaf308dda6c3fda846d4f7f09a3b424c520d890e783456b1c07ee8806f1b8830a671eab11c5b4b
-
Filesize
1.5MB
MD559cedcb34d4e7f4abad7742ead475d5b
SHA10da269c467abc1ac4e0d9b11ad7e7cee64970be3
SHA256431253dd3e5e648697ac385b7dee21c91a606fe280ffc9d38d9c0e978bb78855
SHA512a8ba2286a6045a6a01efeb02ded3243f6e0100d35fd9901d5d435084dd61f1f0ff4918c50b2bd5b67decae80afe5eb0d21c7fd9232821732f6a2d52e3007d91b
-
Filesize
1.5MB
MD559cedcb34d4e7f4abad7742ead475d5b
SHA10da269c467abc1ac4e0d9b11ad7e7cee64970be3
SHA256431253dd3e5e648697ac385b7dee21c91a606fe280ffc9d38d9c0e978bb78855
SHA512a8ba2286a6045a6a01efeb02ded3243f6e0100d35fd9901d5d435084dd61f1f0ff4918c50b2bd5b67decae80afe5eb0d21c7fd9232821732f6a2d52e3007d91b
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize11KB
MD56f9c1f7a97131e2fd88b210ac406597d
SHA1e823f631285f744b5fb3bbf188d5d4e15806fafa
SHA25683a5743b9596a1ed0dd412a83365d930fe784711aa1a5652dbccf154a76234c7
SHA51234e6c9c24714ec080c0c07d11ab494e0a00c6289ebd3be065bff258951fc42f90b7f8ca77395686e725ba8ef0ac889fa96acbc9cd9ac7356ce4ca479c6f024cb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms~RF6d9bb4.TMP
Filesize9KB
MD53c0ddfb07e0c22f938905e4c20900aaf
SHA11258fade38e2427305fbf07f5f1f74de5c22e9a2
SHA2560cb44d93a53be4fcf8e4984fae66cdf64e6099bdaad53acf5d32039c5189436c
SHA512a695ef2a1793cbbe0fc94dc3563bccf47439f73780ab307e8c07ebd95a6f827b495f57872e7f7e66503bdff00292dd9cfadd6a4951a9f70e43ce3c3c1331170b
-
Filesize
1.5MB
MD559cedcb34d4e7f4abad7742ead475d5b
SHA10da269c467abc1ac4e0d9b11ad7e7cee64970be3
SHA256431253dd3e5e648697ac385b7dee21c91a606fe280ffc9d38d9c0e978bb78855
SHA512a8ba2286a6045a6a01efeb02ded3243f6e0100d35fd9901d5d435084dd61f1f0ff4918c50b2bd5b67decae80afe5eb0d21c7fd9232821732f6a2d52e3007d91b