Overview
overview
6Static
static
1Xvirus-Too...rus.py
windows7-x64
6Xvirus-Too...rus.py
windows10-2004-x64
3Xvirus-Too...up.bat
windows7-x64
1Xvirus-Too...up.bat
windows10-2004-x64
1Xvirus-Too...t__.py
windows7-x64
3Xvirus-Too...t__.py
windows10-2004-x64
3Xvirus-Too...les.py
windows7-x64
3Xvirus-Too...les.py
windows10-2004-x64
3Xvirus-Too...mer.py
windows7-x64
3Xvirus-Too...mer.py
windows10-2004-x64
3Xvirus-Too...ger.py
windows7-x64
3Xvirus-Too...ger.py
windows10-2004-x64
3Xvirus-Too...ort.py
windows7-x64
3Xvirus-Too...ort.py
windows10-2004-x64
3Xvirus-Too...mer.py
windows7-x64
3Xvirus-Too...mer.py
windows10-2004-x64
3Xvirus-Too...ger.py
windows7-x64
3Xvirus-Too...ger.py
windows10-2004-x64
3Xvirus-Too...ker.py
windows7-x64
3Xvirus-Too...ker.py
windows10-2004-x64
3Xvirus-Too...ker.py
windows7-x64
3Xvirus-Too...ker.py
windows10-2004-x64
3Xvirus-Too...ner.py
windows7-x64
3Xvirus-Too...ner.py
windows10-2004-x64
3Xvirus-Too...ver.py
windows7-x64
3Xvirus-Too...ver.py
windows10-2004-x64
3Xvirus-Too...ger.py
windows7-x64
3Xvirus-Too...ger.py
windows10-2004-x64
3Xvirus-Too...ver.py
windows7-x64
3Xvirus-Too...ver.py
windows10-2004-x64
3Xvirus-Too...ker.py
windows7-x64
3Xvirus-Too...ker.py
windows10-2004-x64
3Analysis
-
max time kernel
116s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
Xvirus-Tools-1.7.0/Xvirus.py
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Xvirus-Tools-1.7.0/Xvirus.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Xvirus-Tools-1.7.0/setup.bat
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Xvirus-Tools-1.7.0/setup.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Xvirus-Tools-1.7.0/util/__init__.py
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Xvirus-Tools-1.7.0/util/__init__.py
Resource
win10v2004-20231025-en
Behavioral task
behavioral7
Sample
Xvirus-Tools-1.7.0/util/options/bypass_rules.py
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Xvirus-Tools-1.7.0/util/options/bypass_rules.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Xvirus-Tools-1.7.0/util/options/channel_spammer.py
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Xvirus-Tools-1.7.0/util/options/channel_spammer.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Xvirus-Tools-1.7.0/util/options/hypesquad_changer.py
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Xvirus-Tools-1.7.0/util/options/hypesquad_changer.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Xvirus-Tools-1.7.0/util/options/mass_report.py
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Xvirus-Tools-1.7.0/util/options/mass_report.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Xvirus-Tools-1.7.0/util/options/soundboard_spammer.py
Resource
win7-20231025-en
Behavioral task
behavioral16
Sample
Xvirus-Tools-1.7.0/util/options/soundboard_spammer.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Xvirus-Tools-1.7.0/util/options/token_bio_changer.py
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Xvirus-Tools-1.7.0/util/options/token_bio_changer.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
Xvirus-Tools-1.7.0/util/options/token_checker.py
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Xvirus-Tools-1.7.0/util/options/token_checker.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
Xvirus-Tools-1.7.0/util/options/token_global_nicker.py
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Xvirus-Tools-1.7.0/util/options/token_global_nicker.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Xvirus-Tools-1.7.0/util/options/token_joiner.py
Resource
win7-20231025-en
Behavioral task
behavioral24
Sample
Xvirus-Tools-1.7.0/util/options/token_joiner.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Xvirus-Tools-1.7.0/util/options/token_leaver.py
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
Xvirus-Tools-1.7.0/util/options/token_leaver.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
Xvirus-Tools-1.7.0/util/options/token_pron_changer.py
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Xvirus-Tools-1.7.0/util/options/token_pron_changer.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
Xvirus-Tools-1.7.0/util/options/token_saver.py
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Xvirus-Tools-1.7.0/util/options/token_saver.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Xvirus-Tools-1.7.0/util/options/token_server_nicker.py
Resource
win7-20231020-en
Behavioral task
behavioral32
Sample
Xvirus-Tools-1.7.0/util/options/token_server_nicker.py
Resource
win10v2004-20231025-en
General
-
Target
Xvirus-Tools-1.7.0/Xvirus.py
-
Size
8KB
-
MD5
9105f859cdba36dbcfd51c0e70a0d482
-
SHA1
a82b2e78dcd587a002f67dc6bce5b589bd650f95
-
SHA256
e27ae207ed527a75b4d11915252c4866dda8c8183976fd06a1b859eafeb9ac18
-
SHA512
ac23efef2962fb85f5f5c94e0649c6f7b3050990866b48d6714a3aad9fdfca9a2c3c477eb194395138233c64f37aa845d029bb40c379f9576587f23b1b7823b5
-
SSDEEP
192:eGWZRZd7vnTNxTM/DTdkff9XxrcNqTf2BXsYEDn:j0zlvnTNxTL9XxrcNqTA7ED
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file\shell\Open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file\shell\Open\ = "Play with VLC media player" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file\shell\Open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\py_auto_file\shell\Open\command\ = "\"C:\\Program Files\\VideoLAN\\VLC\\vlc.exe\" --started-from-file \"%1\"" rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2644 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2584 chrome.exe 2584 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2628 rundll32.exe 2644 vlc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2644 vlc.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2628 2944 cmd.exe 29 PID 2944 wrote to memory of 2628 2944 cmd.exe 29 PID 2944 wrote to memory of 2628 2944 cmd.exe 29 PID 2628 wrote to memory of 2644 2628 rundll32.exe 30 PID 2628 wrote to memory of 2644 2628 rundll32.exe 30 PID 2628 wrote to memory of 2644 2628 rundll32.exe 30 PID 2584 wrote to memory of 2860 2584 chrome.exe 33 PID 2584 wrote to memory of 2860 2584 chrome.exe 33 PID 2584 wrote to memory of 2860 2584 chrome.exe 33 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2696 2584 chrome.exe 35 PID 2584 wrote to memory of 2552 2584 chrome.exe 36 PID 2584 wrote to memory of 2552 2584 chrome.exe 36 PID 2584 wrote to memory of 2552 2584 chrome.exe 36 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37 PID 2584 wrote to memory of 1140 2584 chrome.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.0\Xvirus.py1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.0\Xvirus.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.0\Xvirus.py"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7519758,0x7fef7519768,0x7fef75197782⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:22⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1420 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:22⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3204 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:22⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3228 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:22⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3456 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3660 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3684 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3876 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2584 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 --field-trial-handle=1408,i,11988851792386700797,9288220894455047800,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6888b18d8b86af1cac94882ab7e666e
SHA19376389843b04129ae02fd21092d6be352a51882
SHA256e820d9e63b6db3b982b415ece3512f7080ee21d8943349d86063589ead91fe8c
SHA5121de68eef55afcb461338a8ebcc5e749eb95bdf7964275fccf3ee306ea6919c356f219a79a97c204f7229ed4d57269bb1a5d777f8ffc9261ab6e194c3f7614596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6888b18d8b86af1cac94882ab7e666e
SHA19376389843b04129ae02fd21092d6be352a51882
SHA256e820d9e63b6db3b982b415ece3512f7080ee21d8943349d86063589ead91fe8c
SHA5121de68eef55afcb461338a8ebcc5e749eb95bdf7964275fccf3ee306ea6919c356f219a79a97c204f7229ed4d57269bb1a5d777f8ffc9261ab6e194c3f7614596
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5f1f459983fcc9e54c9c57598113815b7
SHA114b72c49ebb0ff6b55ae2fda2e98905e53287ebe
SHA256c1fc73948d7bc128211f3c59e50e9791796ca4f19544226e0337826b55cce89c
SHA5126446e9cedb404aed553aebba4514010659bb8e14493c9e5d6486a5d2fe4349a8f93792b4ed1243d4a4e25e0fd89e7e80080c8299bdc9b994f53bcde8350c99e1
-
Filesize
361B
MD583d930eeacafd1043821ee93a366e480
SHA13abcc5c5210cfd77777772f6759d0f698d98e01a
SHA256c804887de296ddeba5fc3bd4d858f9db3f92a6dea860042e2154c80a75edc738
SHA5125d4a83965686085dd0290b9042129a16bdc8d56963d1f0953fedc8024efc8961b1940eb65b1f6bc8e67382033e9d1b12eac9fe86a65f28e4d1b262f18c12d9f9
-
Filesize
845B
MD5190592a8421056c015338badc10af749
SHA1843f023c7f9f6bf8256a34a677684d6e6e0e6459
SHA2562ca3a0cb98cd72dae86116857f13353a921b0f3240b68b91a24844f9a13596f3
SHA512cc18a9da077f59c11cc909beb176296de87e75b97141074431a9ebea8aa7fe9a3578ff71c68acc3a3a36376dcaae1f4fa3c70184be2a21997b5720d0c990e1be
-
Filesize
845B
MD56a36e11e2cf784f4a0c8ade5dab09eba
SHA12918ca7e3e08b5eed2eb79f43ee3eb66781ba724
SHA25667bc625834ffd28646fb8069a168bb8573ccd67cfde7baad1ac94f465e09b23e
SHA51266436ad8f1a4b09a36e9d7ce1df48a12720ffc2c8fa564894ef613ab7294a6c06616171c81db0e345f41eb83d88305ae3924e6b93b9c2faae1d7e1ba9be94927
-
Filesize
845B
MD56a79fa7f8b7f3b143cc4be7bfdb94bd7
SHA142dad296cc4c7b54896244e3e2f7ec1e8963922f
SHA256a966b1b510c1e0e77c77513100dec4c36f08d09f33baf41d1379dc46c5c5492d
SHA512488d0f04f54d50a6ea30cfddfa8125bd94a53750334dbb95bb8bdc9fb0438e2cc09bf8d1d54c70e234241ddf33e337c5250d5208b0a7bfef34f2d5caf9727973
-
Filesize
5KB
MD50b6ba7b24369a568d954e2132fce7f47
SHA160fdd0d49c11716b68d53c01012f8df0fe95956f
SHA2566d12925e08bf9dc7f83bb7ca5d14169d9c3428fc378af5915667e02b7fc4b1d8
SHA51253c7e0aca39c28c51860e00f6f88967da6012b0ee27d20b7e0fdb6badecf126cd14f850c99241aee773ff9c495f34554fd77a95f640d438dd129c0a7f8bf903e
-
Filesize
5KB
MD59d2bf87ebb908f7a6df37e77be95d368
SHA19ba891ca1423cca67e9d4117a5c5e549d974832a
SHA256f704c4f3114e914666584e298ec6e25255e3207cceec75d9ad921c9bdf749ac6
SHA51246b039e86b1c03f58c844d71bbef9854c5b86d67205c80f9970d360c921392d987dcc254fbafec020f22d2a68240a0ec6bd72f2272ac1d529f618b53bda751ed
-
Filesize
5KB
MD5141529a6d4bf9e1241ecf2b9017cf183
SHA1763c5b584ecbe5659761b152d8476f3ca80c435b
SHA2562f49b6e1b55c3b0c04dd7775806f119e2fadb2660f080513d7175d1bed837099
SHA512ee4737c9407e3438efa2802d3c6c528577b36d9746124555a7502de997618ea36b2a571a2a36266f5574a32904d3bdfe7bdb951b321c1643e1483bd6f64638d2
-
Filesize
4KB
MD5f62c4dcb5b98377cd4827611c69a9737
SHA1e41d6738512e3050a8fb8a5e64e13633a9c2a9a2
SHA2562e899fb9c7b99bd69d6eed1ee6292bebbf9786e8f318db38219155d49cdb7aa6
SHA512b2a6c0358f86911bee9426c05869ee0922055d79821ece3d02e6267ced350c491ee0421344eb6e706b4f882f9dcd894e250bdfe104b5fd3e195b59e85885cce9
-
Filesize
5KB
MD57751e9f914f57be7d8df3817d856b90a
SHA1e746e63ac31c5813750c970e934cbe1e6731f1b2
SHA2560d54b9340b2be5f892525d3ad9b017318c87c186760a293089511b392516b68b
SHA51213ba7720c51996cc044108785ddfa6262ea2b565e418cff81b4da3fd136d9a4ad12734c59fd97687c4ce32d09935de1dfde4377d198a1c799a154edba8570e3d
-
Filesize
5KB
MD5fb0097a0165bd129b70efa2f898e610f
SHA1a9ae053d003134637ecd8d3c5194e31bcd53d315
SHA25626d9b91dd4e3424ceb1497c230a55a8ae27ec2f71b8fb6cb2466be28f801b6f4
SHA512693bf344afd19cb50d986ab27c1d42617a8dc16186c0f040c8962d1bdc1e4c5009cfed6c71695773985559de90890ecfab68eab432489e647642a4cd4301a9e9
-
Filesize
5KB
MD52efa3640f852602166f48b25894d256a
SHA154e1b778d644cd730b1982fa5df822ccefd9e65a
SHA256966416ec257a48b5046917df92a6bcd45531b99b078008f647aaa0565393febb
SHA5120b93c11cc68db92a6ab77dee3c9906b886e280052d17b54a1071aa2c2a90ec49c29114534994483d82cb044619d40b9f11757ce3a4c9746c6857135d0b83bd15
-
Filesize
221KB
MD5d3f54525b7fdccdffd67f925f77920c6
SHA1919a3078feadefcaf111de3c6ec41f34135b7aa9
SHA2562e7dad5c67f813603dbd007743d93ad89ed6ca24a6d2e168b7bccae9d92669ec
SHA51266897c86acec4493766a646d6c7994d65b6c534b1f298cccc3a8e2c235b4f1a1b8c197cba6fa6ddbbff553364aaffb30b8962e987cfc5bf9a1eb0d621d681c8d
-
Filesize
221KB
MD5d7d4f721a444e84d5b7265c41bcd66cd
SHA16df3705aaff6a00ec5fb8f08423fe7b4b3d67c5a
SHA256b22095f49c088635c885c71d43a6a2f4ab626cf36fb8150f0b5507a7e385945c
SHA51201530775ea713cf20bfb35414c4dc448bca490ac11da13c858cb48e4f8c362ee178bd733153ad6648c69c7d9442fe0774514537135f6b9b53bb2758df794a6e4
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf