Analysis
-
max time kernel
38s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/04/2023, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
111.m4a
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
111.m4a
Resource
win10v2004-20230220-en
General
-
Target
111.m4a
-
Size
7.5MB
-
MD5
2ed649de12654fb2e3a5bf49a1795980
-
SHA1
063d5f8d49871ffe5e4ae1b73d7678f1a9942b22
-
SHA256
048ef771e7f38fb79873c636bf8e410fdda0d15793c2bd4fd9561f30568ff894
-
SHA512
9c3af1805338916a271b6165953cdadcc1545c073117175e1a0122ea185ab414a8aa0f604898743c340c5c77f61130fd1cc0b76d14e21b6ddc58d3bc91b3ef8c
-
SSDEEP
196608:wvT5V0z/fDfd3JOPLDoF6ccLjDci4yiF9KtAuZYDu4:+KTfBJOPLDoF6Z7KyaK5h4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1700 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 284 chrome.exe 284 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1700 vlc.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: 33 1968 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1968 AUDIODG.EXE Token: 33 1968 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1968 AUDIODG.EXE Token: 33 1700 vlc.exe Token: SeIncBasePriorityPrivilege 1700 vlc.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe -
Suspicious use of SendNotifyMessage 53 IoCs
pid Process 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 1700 vlc.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1700 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 284 wrote to memory of 1404 284 chrome.exe 30 PID 284 wrote to memory of 1404 284 chrome.exe 30 PID 284 wrote to memory of 1404 284 chrome.exe 30 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1952 284 chrome.exe 32 PID 284 wrote to memory of 1624 284 chrome.exe 33 PID 284 wrote to memory of 1624 284 chrome.exe 33 PID 284 wrote to memory of 1624 284 chrome.exe 33 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34 PID 284 wrote to memory of 1704 284 chrome.exe 34
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\111.m4a"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1700
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4209758,0x7fef4209768,0x7fef42097782⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:22⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1440 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:22⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2244 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3900 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4152 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4032 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3908 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4068 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1816 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2348 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2640 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=740 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5372 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5524 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5660 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5444 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=media.mojom.CdmServiceBroker --lang=en-US --service-sandbox-type=cdm --mojo-platform-channel-handle=584 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6084 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6168 --field-trial-handle=1276,i,16323399705283746446,15810818243851260849,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f3ace18702f61d777a049ff8bcb4ad
SHA1b4c32dbc1e4455db937c2faf6da5232367b6ec89
SHA256cb45c02b9008f230c808f180cb2061dea10a739443a2e152ac3c7c2e16eaaf07
SHA512ac4d565523be550871de347cd8d7f76c192b5e211839e2ba8ae199f22e86ee7938e4f6d3f8f4e606c529a84145b0a0b1c82587f903834614d3353bff6be62248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b4a8bdda60029e9bc247718d7be58b
SHA1801317633343e978c0cfa71423b89866f58c1750
SHA2567526724894e0ea4251e5ac3b69829d13885aa7bc841a82b52409a8a6eefab0e5
SHA512fb5f56bd767698553f5531f9d53c97b54c5fb307b44743e49541f2cf3870377fa04a566e9400ebda7d547a087439e310845210f0faf49ccaf6f30214d391a80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5fb1e9007b970eed2e116a7ab1dc19
SHA1377827bd4dc0570596cab124b1fc5a6e9129fee1
SHA256eb6a2d1a894e5b9386f160e687fa68fdc68f0b96a8e4fbb559bddfeb7de4532f
SHA512ed9c515644c24126f6d2a6070cf8df4b708db4393a888c8188283d76e6381fe958e62b7aed41de821ccc1f021c07bf79a45f427672d83358b7714f7360b08e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7f0deece67413a4c3ed1a79bf0e637
SHA1a71c8abae0258c24b807accb930dfb72f421345e
SHA25688ddbefe1c13fbc1af366843e726d3ddc0ce985629368bf4fe8024378628204f
SHA512a966847358e038821e914a10d82e7134659747160265f276e6fca50f9034a57d6e0db80c646e7afc069e0a958deca34519d4c376fb0589eaa6f5fcd31278dee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d7a5d5e3df990bc415cc467099174c
SHA1a2b5b03000e5d5ac53195000a39e6dfde300497b
SHA2563dd25a5456139f8ad54e3b5c2ee4bdf688f2377e1de40658dad8bd47d60b5837
SHA51209dbfde38e28a65ed7de56c9098290e46856f8c702e196329d7a91e05f3b7eca27474888e33007e405275224a071068de212c3894d27f1c66bdd36e53f6916c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2fc8dcda42d260c7dd1191b35e1996
SHA1aad91f8b8cb4e030d1accf1286ff35c42b51adb4
SHA25691964714a2c8899d4bef98ae38152248b40aca0cb838474924711358f82f3c20
SHA512b00620bf34cf14f2e23f4fdcedf53bd256aea52eaa02c8fc6274367aadba61359c22ea886ab945bf0a01440b9206d84113d81b1fbf335fc8e1202ebff101f7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534340822d5298c7b770ec1cf0bffea5e
SHA1c2f15c7d436100074461e54bf93eaa6d75661b1f
SHA2567c841af84a62234698dc723cf9dd49f31409d74bff0e2c7ff7c642e0d2309422
SHA512b4bbb4378423f424df014ba9b011dffef54b0aff01a7fcfefeac4f16931fb97bc64e477e943b09a291a2c2104df0fd904aba7512d8057a723cc4774273ff6c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c09b838374c38d2c055c2b3311f9710
SHA1607e14263e9ae6bcbcb04ab7eb0e10295b7e651d
SHA256b333a33fbe2d52a9d15f684c7d223e0f32fb8f0b62ba65002f2c2c8cb3383be2
SHA512c86745208dc746ebf8f8eb3dc1d456704b355bb2ba6bcd7a68d6fe29c435b3eeb1f64996cf6f017d8315fecbf5fe60622dfa912d0672ef1f910c54027c0d0958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56479ff32f2c7938a63f1454349b00fc2
SHA169dc122da1ad647584ffdf325aa14e98e55adb3a
SHA25622b9d901e534fb161761082f9f3b11d7c2cd05c10204175394c0872a6a53db5f
SHA512edd1476c47c3d3f2772f8eba03e09a2736c385e954805d1b0565ec93afd4f7a6d35c87d3624172cedd64ff33ba240a9d40f7cc7a12b5d812e60e7595e0a5b5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dad76967a3efebe5f9d048f9c53960f
SHA135620f7b42f2f2c829b2cb19154e694460e12a76
SHA25634583abe2fb36133f3fd4990ccc75b0c2692f1bd052675537d0cdc6e48a3ebb2
SHA512cccfa1d45d14efca027fe897c84e090eb28f06988b6e853e8746299d40bc7d3eea737cdddfc784e4d11974c82a3ffc3c1770d2e0734c7add034815440ab7a498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ba9070a9df63a401e39372106ecca8
SHA18b4ef8222cc35e2d61c88a19a8a60902e5de8001
SHA25624c9110790ee6b098d397443e14d638f32941ec30ed73dc14d1ade7540f9a5b8
SHA512d253dca96a6a6a7658035acc3b85ca23cee80f6e2227a233415e95127c12f55b889924e998977025484e6affd336b6ac629986ffd4f417cb3cf07f764fd758f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3b458cc1b8a7be2c6ea79365e8c57b
SHA1663863cc7f8537b1435beb7ed78bf0e8e0ff58fd
SHA256c892c80f4409db6f5e58013bf96ba00463bab40edd3dda434b776e5d93cba4c1
SHA51253f3ee8f77b69f2e8adcf745988dfab651b057ba50e6cbc6a6c0f703c71d0379373eca07f91ba41182cbb608757da3a4d875ac5d3dd2082d76117e3d82224b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea06937f902a5dc53c396ea22247a64
SHA19d703112ccfe8000782456f3ffd0c56aace2a780
SHA25636e360a73d2aa9b2a6046454c5929ebc41d74f40c13f2a83c8a4911b00c9fbf1
SHA5122aad020ef417bcd96637d55f4d4d7f904bcc5c8c26815f2921ae9765a577c5b267ae3acb80451afe4ac7c3cf9e693176d4802b094e30ec52f5cba0731a459762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd15890012efe69db6d9868cddf9aaf
SHA14c6b5c8d34b71a6008dd53796e6532aa4b596e50
SHA2560291561a2fb5211708fd5727a9f4e8754e2c80cc1772074e432792296288e4c2
SHA51229936f61ed9ac30452c3afb3e917f24292f8bd62ab7f27b24309f1aa9a2230362d9e3289b2bb724e16d3f6c25aa384b67ba5de7409cd627b6e7efb1e15dbc9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5e41f09708b8cbfcb88a138a3336d5ddb
SHA1c711dd5465b3b21724ebe8cdebb568a16bd10088
SHA2560e082faf9cae4a9f37a3a9be89a23f3da8eba76ee84f99f79e054d3d5168703c
SHA5125db35f595c63c88f1db5791c4366a3875112a1a91df32ee2a43dfe9b799ac2ce453a99a638ab245f55d6bade66d2b46060c71fc1ead80ec39c48382fff592fe6
-
Filesize
294KB
MD5f7705716a85b63ef11539396085aa4da
SHA1bb145cdb0fe8432eb346f0069ccbac284ad7f682
SHA2562fc9afc930bc84e927a5d4f1ad4da7309ca8dad3648366c17d06949c2cd0bb24
SHA5122c08c11c60e808becb42a3a08131d588562e5dcb3ba47d559acabafd6e47e2a72d3d996aa86e6f82cd65cc93959809914bf2d12f4682628e46c7f8cb91413038
-
Filesize
163KB
MD5109e1354dcad59ff8d3e589dcc09299a
SHA1bc2cf564c7967a59936c2074b78e124e17439c3a
SHA256a9f34a49984f7a94c7a522a6d171e470701d34a4b630dcb7ae673e6cfaf2e5ae
SHA5124a85f37ac35db60a44e729a0ee842e45172657c17c71022dfa73aed445106b833cdceccf94b1735737d5b9c06da8db19a6799186bbf742544c943a4b8de737ce
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RF6cc13e.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD5da8b01932704a8155a7a0426b567031c
SHA16bd2312f8ad0ef4125a8cc78c6ad23823915db6c
SHA256c93d02bef97f20bc63821ad1f9d7e892dac7439a508eb55f88e93c8b41f3982f
SHA5125417fb622d56783037a198b4cb1fb25588dd859f0e9c72a514acc945dc33991612efeb8ceeb0d9a26b66cf11b94e725b1beedef1894f2f6fd9533252566f83ad
-
Filesize
1001B
MD55348da82ba1c30319d8b9b378a117b2a
SHA1897b62b0ce183bc1ba88104c9385c03424d5e4d5
SHA25632566d3b1efd600c095b7633d1446a15ec167f654899e75c883d5ebe8309d275
SHA5122f24724962929421b8e915c69c69c1d2452414de830953b7da5d888613f350a74839853678535050769ba1081af3f3949f91f071b8d806586f8592c983a4e20e
-
Filesize
1KB
MD5a47e844909b5ab1a54e7c242c84482b4
SHA15b3fdfffe0bf6639faa0e6736fa187a654f99054
SHA2560bc6d4c9e1a7e229046aac6118486336720a446b04d3f652bbd0cbdf201b7338
SHA5123c4f71d309e1d62a006fc1e242dc97342453bd7b6fdbf521ab9da144bfdbdea76e263d98f83b5bb53366d7de7a8f3061b338f88f92df3bb3120e0c684a2f0e14
-
Filesize
359B
MD5bb5f9c971c4a93339c73931f6411d680
SHA161250a2146227bc7368b84c63e1c3819ca3e9e08
SHA25683d74c4f98b3dd4c37c4a64aad6e85c3210c5031136cd585b200e0ff75a46bc7
SHA512e37918f5569f0a6b3e030281a5e6ee2e774e9e67b16ae35e2104f6588a9c578178aa7db5476459dabc1e7dc3192485b4ae9e117e7f6389ff1e3982be73785045
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\bb1b9192-347c-4e26-a809-a790d0303dee.tmp
Filesize4KB
MD5e1314390e9a69bffedf38e6866841120
SHA190fde0dcfc102b9b37dc5596f522f5d3d3b08503
SHA25688775f6dd8f795df4f74a3668e8069f8c60f6ddb4e84b71e05213e002bdd672b
SHA512a43a183e62c00c3095f45e3619570c8563d8c036f159fa89f9ad3e518ac05de24bbbdd12f08b45a4da3b0b3b0e85968b6abade327fdf95197a6b7742a73a4aee
-
Filesize
4KB
MD5b2a5d49a1049e77ad65ab523c266c9e6
SHA114e036c99e9775fcc0702f328d7b4dfd2ff89171
SHA2560da90efe1c5a12fafeb644d89eebd1d25e335ea7338037f3842412b0eaba6d47
SHA51245e8508fda5dda0b33558bfe45aebb78b32f706c2ebebceef1bc816920208755d1255eec484522a0450b960f0d0977fd412bb459e5d3f67982e5f105678bbcfb
-
Filesize
5KB
MD5be5d442ab31de3bb71249451496bdf57
SHA1775a863f3720b48eeedfab67ddad3d394b7ae17f
SHA2567dc3a6f8bd595c3242151b7774fa3ce9ebcc22ccf443141cd9c650e90d9f9f8a
SHA512a48767173e87e3756434207f9fbc32b0c0638d5f0156096c5ee728e38eef622d6d54b52c56f9902e0ffc8a148a1c0bac923b7b602415e08dffe8d47c991135b1
-
Filesize
4KB
MD5695ac0f9a59c707e8409912612d687a2
SHA1fc7a6dc9fc8631acd2f6e5cbd905b8adf2d424a2
SHA256cda547d215f8b67b0020746ea05c295b4ba76d8e7c200dee782126bf4566333e
SHA5123bd1ccb74cd26cbb8dd52e3235e6d391d44d075737a66d70283333c1dba26a5bb6834e4c20dc8a2743b3455dfa997250722f09a1d036e8422467fd3526b99466
-
Filesize
4KB
MD505e6c41b3498043aec72ada2741bfbcb
SHA1a950df649acdcaca4dfeef74c6dbb9acec3c9161
SHA256e4a18a73bef8187ffbfbf4aa4683931811934aea97449be6b23a9cd193112ab1
SHA5124ec7ca7a330ae17e66a2784ed99b50c40e3ccb59e5c572c1790e0e8c54cbe49e3c22a8f94462542202e56a45f6e938d8ea6e53918b11d7d4fe0c5c67c24b30a3
-
Filesize
4KB
MD53f1f4a51025bdebc00a7c11c16c8d21a
SHA1c79e27be927f37afa1f8feb8e2e0fba8a345a454
SHA2566deea3ca71b780afa144ae9ff4c96ee0f86de8d09f3ca2bf32dd60cd9f370d26
SHA512177d83455b1ef53322eab6c373c0d066c4b3d01d50356f0ac35d00a7294e7bc4243c874aebe3fed687565b6570678a3853fcc2e473b1ee6f62ab41f6a09ef810
-
Filesize
5KB
MD5b21d5ac8f3686651b75d6583f4908769
SHA1e3365032d4598744240c9c8e87e745e6768b68b2
SHA256e816f9a992fdadf2312b9b61140314241d29eafeb68f1f1c73a2d07fca80d9fa
SHA512950da43d18393f8f5d3fa2dd1d59448dad9ec830015c19ccd953a4fb214c94941cb62acbaff7ca0441117c6df7828f895e65639a77548e6172ad96ef77fd1bac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize129B
MD5bade2aeca2659bfb9e1584782cb25da6
SHA1ee563d5f178ccbceada3de0b7fc82a1c2d29b26f
SHA256a1b17165a1583657cbe1005ec95ab33ee7a07d4c7e7905ac1b9c9355ef0aaa2b
SHA512b7f3cb456c39f22aea686fa16e72895badcaed3321528161e5772d6cd149a2a265fea8b0eee1348b6c2852df61cac3843844621e85f427eaeba2029e66492ec6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\blob_storage\bd33cf2e-6452-44bc-b369-950f6090efd5\2
Filesize4.5MB
MD52cac31271347d5f810440bcfa8431897
SHA1706e190c296d60417490a627fc9273c8fcb93b5d
SHA2568c7caacefdc98de4c5de007ac5d3bc7f9bcb6a882e98cb9aa1f3630e8f97de3b
SHA5121898127e2356d37b2458c30e325995a9c64362f5d3cd9e068cb0c981c66224e607fffeae4768186f7650439a52e24507ee68b2c38db62cffbd7e5981c7a1770e
-
Filesize
200KB
MD54384c5e86a6c6e8341babc7f3c9e6ba1
SHA145805a015f78cda8ce4ee3191645e14d0626511f
SHA2560d89b82eb62a2c8caac5f884b4355d7dce0394ad9ca337db2f64b6f60f89c242
SHA51267e90646e1d6ce2a9130b9f2860f752377ce0aeccefe12a25fe4141f741f627b0d4179886f3a76987dec1bdeeb4c22b38556eb7b608f5f37b9fd032787e84600
-
Filesize
200KB
MD525778e509162a3cf01c7141c00defaeb
SHA1ad2751895957f0166275dd7201c7fc8a627bca88
SHA256b98aecd57c22db096ad2ec9a7a1f984c9a18e7edb26d105ad69d9b886661fd7c
SHA5126e96524323b2c4259e0afc69d5f8da9c2063b636e0fa6944c409e89bbc37fc3230dd2ab6f5e4191a50d0d38a1465cd7fd08e4461f418c15ad4e1fd71f471ebfd
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff