Overview
overview
6Static
static
3Release/CeleryApp.exe
windows7-x64
6Release/CeleryApp.exe
windows10-2004-x64
1Release/Costura.dll
windows7-x64
1Release/Costura.dll
windows10-2004-x64
1Release/Dragablz.dll
windows7-x64
1Release/Dragablz.dll
windows10-2004-x64
1Release/Ma...rs.dll
windows7-x64
1Release/Ma...rs.dll
windows10-2004-x64
1Release/Ma...ns.dll
windows7-x64
1Release/Ma...ns.dll
windows10-2004-x64
1Release/Ma...pf.dll
windows7-x64
1Release/Ma...pf.dll
windows10-2004-x64
1Release/Mi...re.dll
windows7-x64
1Release/Mi...re.dll
windows10-2004-x64
1Release/Mi...ms.dll
windows7-x64
1Release/Mi...ms.dll
windows10-2004-x64
1Release/Mi...pf.dll
windows7-x64
1Release/Mi...pf.dll
windows10-2004-x64
1Release/Mi...rs.dll
windows7-x64
1Release/Mi...rs.dll
windows10-2004-x64
1Release/Sy...ce.dll
windows7-x64
1Release/Sy...ce.dll
windows10-2004-x64
1Release/bi...ain.js
windows7-x64
1Release/bi...ain.js
windows10-2004-x64
1Release/bi...bap.js
windows7-x64
1Release/bi...bap.js
windows10-2004-x64
1Release/bi...pex.js
windows7-x64
1Release/bi...pex.js
windows10-2004-x64
1Release/bi...cli.js
windows7-x64
1Release/bi...cli.js
windows10-2004-x64
1Release/bi...bat.js
windows7-x64
1Release/bi...bat.js
windows10-2004-x64
1Analysis
-
max time kernel
88s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/07/2023, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
Release/CeleryApp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Release/CeleryApp.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Release/Costura.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Release/Costura.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Release/Dragablz.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Release/Dragablz.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Release/MaterialDesignColors.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Release/MaterialDesignColors.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Release/MaterialDesignExtensions.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Release/MaterialDesignExtensions.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
Release/MaterialDesignThemes.Wpf.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
Release/MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Release/Microsoft.Web.WebView2.Core.dll
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Release/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
Release/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
Release/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
Release/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
Release/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Release/Microsoft.Xaml.Behaviors.dll
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Release/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
Release/System.Diagnostics.DiagnosticSource.dll
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
Release/System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
Release/bin/Monaco/package/dev/vs/base/worker/workerMain.js
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
Release/bin/Monaco/package/dev/vs/base/worker/workerMain.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/abap/abap.js
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/abap/abap.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/apex/apex.js
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/apex/apex.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/azcli/azcli.js
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/azcli/azcli.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/bat/bat.js
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/bat/bat.js
Resource
win10v2004-20230703-en
General
-
Target
Release/CeleryApp.exe
-
Size
8.7MB
-
MD5
76a355bac0e92a1a70e72c950f4454b4
-
SHA1
b21f1f0649bddd6dd879b25e0c603c04761188fd
-
SHA256
ea5493c1b0a0cc6541ad76301b6abd2d94577283f731d4b46328555bf7f437e7
-
SHA512
f8115321b930c7d8d7ab592450744e0efd9ca47d907fd23143aeb7edcc79052892f67786681125b569a08b7d238f41ee8cbc2383b00541b3d82ce0d57e2f1688
-
SSDEEP
98304:qza5igLIRfyC7egWJ3PJzdjf4fwraOWcD9XdMPABIw/t6KHDicVwzUsSp:q5guhega4fJOWs9XNBZ16M2cuU
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 chrome.exe 2740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2856 2740 chrome.exe 31 PID 2740 wrote to memory of 2856 2740 chrome.exe 31 PID 2740 wrote to memory of 2856 2740 chrome.exe 31 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 1676 2740 chrome.exe 33 PID 2740 wrote to memory of 2944 2740 chrome.exe 34 PID 2740 wrote to memory of 2944 2740 chrome.exe 34 PID 2740 wrote to memory of 2944 2740 chrome.exe 34 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35 PID 2740 wrote to memory of 1952 2740 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release\CeleryApp.exe"C:\Users\Admin\AppData\Local\Temp\Release\CeleryApp.exe"1⤵PID:2872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef60c9758,0x7fef60c9768,0x7fef60c97782⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:22⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1548 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2344 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3184 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:22⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3220 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3440 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3564 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3508 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3696 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2532 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1292 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2312 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3912 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2328 --field-trial-handle=1236,i,15659107516873966605,5882077598601276008,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52922e7b5715059c889c5fbcfa76d7892
SHA131fe54b31a2540aea4bc1b5a3c6e36960490bd6a
SHA2561441b7618d120b38cbb855891893bd60484f08a5cde99e71a0fc72521a32ab5e
SHA512508c9bed8fbc6aa427cd4a18671bf8f8fa9ddd747c01585d1f4556e2ff1f2fa4fc31e0761cdd144dcb552a16f6efc8874da922e73c344da995581a5538e9cfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c45639f52b416b52e09f60cdeee31a58
SHA137030623191aeeb3074e9641e4ae71947b90de3d
SHA256f8687335b4dec64991865666a8bdff03670b7ea94769d848ae275dfc26861c85
SHA512d069cf1b136a91516268acfd8b7834ac8b5c29ff2cb8e5653c67aa571dfa0ac57b3ecf01d94eb020ccb520ac83a2393c5d1e5a7d9e86ab176451c9542b05b0ef
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD5cc220b38c4947dd68f577a7d229130b9
SHA10e576f075264caede385f8972f8ad7bc8da8fea9
SHA25612c799975455697089cc7e83eb4231cf87065dd183c15a8f6ef45d0f6c29b6e9
SHA5120b885dcb53834e49d796d0be274348e7fbc8f4276bf6b4c5cee8d11e93443449c86d7e5908b87f51626943f587abf6154fb1a68d7718e1eb512ef8d29bfc8653
-
Filesize
1KB
MD54ef9aba123c8f2468f901e927bfc6889
SHA1ca26a365ec2440ed9f80ceedbee89efd6c66df5d
SHA256bf0c83324f928f17e74c28acf5bdcaa2de385beffe12f388a4a62fdc63847d4d
SHA512b4ad8c8da3249beee41ba634bfb44ec0e7946227b49b48076a6733f8f7161aaacf2b2287d0e5aa85e3e5b97bb182041d3eeb19b5d77be7b9568b25d8fcfd4f46
-
Filesize
2KB
MD506a917b5cf35e31cc8d756703be560b4
SHA1294eeb90b7aec164c7a49308d5f24482e25675e8
SHA25673b227f6e25da6b764747cff9b66cca10f6ac23fb0d2b0ff585a755208479e57
SHA51254414390be5cf2084b8a429a442425b7ac0e9f344f7a15376aeaad4825364c7944c6834f0b5b3de064682e46d2fc57ab1bf762990f68e6af8638cb99bb05f30b
-
Filesize
363B
MD5692afc81bdb1811d027f317a5e4bfd52
SHA1fb8a63c2c19f2091f2e4d4e98a71cb0d9132d196
SHA25608417b89c36dcdf71101bac8b426bc844d5808ee8f58af4e4c1c0998df0ae26b
SHA512a16bd514e78364d322d5f1e6ae5cfe88f16f9dddddf1e1a5841772f5c7bac9424b60a1ab251c97e262a0755ce0577836d4059306691d0a7c4ec9172e018dad4d
-
Filesize
1KB
MD59d1ff29155dd75c098f9d9d8bb113561
SHA1b750b9972353ae61d7af5cdf02a332533b08b879
SHA2561bebf7a7031f96ce99c015ecbcabdfb25ee7f4327e2cfc1e609309b3227a4f21
SHA512f0411d676d6dcf7716b17dea02272e92442f8a96eafa4f1e6b131d37470987eaecd6e2744f63fb66e1821479c33517fc9eb160b9619dc93fae8ce5e6379299fe
-
Filesize
2KB
MD55f2b4a3e3639a58988d2565c47351cdd
SHA12506766761f94da42bcebe27d3d23d3c5f809491
SHA25633ea2c9cd0c9a20174b2de4bf20209da6afa516223599f60f880b27824879534
SHA512a3389f39d2b1af3ca1e4cde6d3f764b60cc1a83d8ac849137f6c8239231a7e9c7524e793a6a47a4c48565651b8f4ff0a288f9862ca93c56f7a67882ee412de9b
-
Filesize
4KB
MD57260ff33009cfc9b2c01d917d9a2b265
SHA17db42fca7a7c338a428562a65ea632f8429e8bc1
SHA2562d05818d54588ff14dee38602415bea5c193e7462ca9516a7c7cc477bd3ac21c
SHA512b0d3fa5dc95c0646ba2370660607e246aab8b5c7ddd60567eb5b1ae7ab74ff8a094a14afa25eb682d1e702835a89b509227be7396464a65a4ab2779cbdaa45dd
-
Filesize
4KB
MD575747cb874610824acfa0f25a6984270
SHA18b42bb63aa0b0c4c0e269a44157748d3fb895bb9
SHA2560a5194d6e93514f72b95b6f5c5389d39a77763b01e64efa2ebeeef18bf854c57
SHA512fcb8fe9031c0bb6ff7fbb9c623fa266fd63fa74bcd5f0d2e8f4276e7993880cb13f9ece8acf5cf3df8ef0d7da7a499859d7346e46157a23de2ae7afb4849f0a5
-
Filesize
5KB
MD5eb3d2352e8c04b4dc22864d9c166e898
SHA1b561071750710aea051740fbb709a626f5a40b8b
SHA256e6ed87a5f87d84a72579a0a8361036872bbae3756aaf7f21275a7a5dad1d0f1f
SHA512be5fc93b5e5617f0fcb0ce2d9fcc585ec46a010cb7bd04b37d549d84a5d96983e40c94732deeec4f724d8ed5b3a8cc0751bedc3e4069c1815a71801820e45f27
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
77KB
MD5aa0b8cb6612642ba6d29edd3ea61a82a
SHA1d9e09972d8671101d6f84342ad444fc3e14da304
SHA2566c734a0449f5a2f8e1a84e62995151f0c2a6d5817f4fda682873fb649d279c9e
SHA5122d64589a78551146684778f5958f56e8f334705c07d418f3c3216b20d8393d83796662c50d271f4c844c0d1c52ed587d871773e7278769a4e2439b01f47b445b
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27