Overview
overview
3Static
static
1UwU.zip
windows7-x64
1UwU.zip
windows10-2004-x64
1UwU.zip
windows7-x64
1UwU.zip
windows10-2004-x64
1UwU/data.pkl
windows7-x64
3UwU/data.pkl
windows10-2004-x64
3UwU/data/0
windows7-x64
1UwU/data/0
windows10-2004-x64
1UwU/data/1
windows7-x64
1UwU/data/1
windows10-2004-x64
1UwU/data/10
windows7-x64
1UwU/data/10
windows10-2004-x64
1UwU/data/100
windows7-x64
1UwU/data/100
windows10-2004-x64
1UwU/data/101
windows7-x64
1UwU/data/101
windows10-2004-x64
1UwU/data/102
windows7-x64
1UwU/data/102
windows10-2004-x64
1UwU/data/103
windows7-x64
1UwU/data/103
windows10-2004-x64
1UwU/data/104
windows7-x64
1UwU/data/104
windows10-2004-x64
1UwU/data/105
windows7-x64
1UwU/data/105
windows10-2004-x64
1UwU/data/106
windows7-x64
1UwU/data/106
windows10-2004-x64
1UwU/data/107
windows7-x64
1UwU/data/107
windows10-2004-x64
1UwU/data/108
windows7-x64
1UwU/data/108
windows10-2004-x64
1UwU/data/109
windows7-x64
1UwU/data/109
windows10-2004-x64
1Analysis
-
max time kernel
66s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
UwU.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
UwU.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
UwU.zip
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
UwU.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
UwU/data.pkl
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
UwU/data.pkl
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
UwU/data/0
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
UwU/data/0
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
UwU/data/1
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
UwU/data/1
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
UwU/data/10
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
UwU/data/10
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
UwU/data/100
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
UwU/data/100
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
UwU/data/101
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
UwU/data/101
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
UwU/data/102
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
UwU/data/102
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
UwU/data/103
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
UwU/data/103
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
UwU/data/104
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
UwU/data/104
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
UwU/data/105
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
UwU/data/105
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
UwU/data/106
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
UwU/data/106
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
UwU/data/107
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
UwU/data/107
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
UwU/data/108
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
UwU/data/108
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
UwU/data/109
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
UwU/data/109
Resource
win10v2004-20231215-en
General
-
Target
UwU.zip
-
Size
50.1MB
-
MD5
56685b214f3d6f8ca460396a1ac66243
-
SHA1
afa43a57994ab1ed47185684643bf0aa847ea5e6
-
SHA256
f834a273654b9b00270c6bd168d1917c6df1cee1175110ba357b7f2052b32d9e
-
SHA512
2fc680a6803e52b9cdec017425411d8835e7e537bc5af4f61aca10ae391d12f37e815b13e46949110e08c663ab6a0494406166e693219c0766241a54087cc1bb
-
SSDEEP
786432:aNnYgRiDUNEeYOgIR6TZ7VCaxik2SjNouEuLRmEFl7c0+AvnXDtIjYrlj2entv2Q:c2hPfsyxRhHE4R53f+ASYrll5V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2052 2704 chrome.exe 29 PID 2704 wrote to memory of 2052 2704 chrome.exe 29 PID 2704 wrote to memory of 2052 2704 chrome.exe 29 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2688 2704 chrome.exe 31 PID 2704 wrote to memory of 2748 2704 chrome.exe 33 PID 2704 wrote to memory of 2748 2704 chrome.exe 33 PID 2704 wrote to memory of 2748 2704 chrome.exe 33 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32 PID 2704 wrote to memory of 2588 2704 chrome.exe 32
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\UwU.zip1⤵PID:3068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6cc9758,0x7fef6cc9768,0x7fef6cc97782⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:22⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2828 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:22⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1336 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3712 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2532 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2996 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:82⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2752 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1772 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3340 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1156 --field-trial-handle=1108,i,17094256846044534388,9770228697756408305,131072 /prefetch:12⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD536104d04a9994182ba78be74c7ac3b0e
SHA10c049d44cd22468abb1d0711ec844e68297a7b3d
SHA256ccde155056cdce86d7e51dfd4e8fb603e8d816224b1257adfcf9503139dd28f1
SHA5128c115e3e5925fb01efd8dda889f4d5e890f6daaf40b10d5b8e3d9b19e15dadcb9dcf344f40c43f59a1f5428b3ee49e24e492cf0cb6826add1c03d21efdec52ba
-
Filesize
672B
MD5f1067ef6861a74ce82fbbad4b2fd53b1
SHA128ba286ffc03daf83d3f506993f2729c549784db
SHA25630f23fbc1987769f1a776a4773dd05bf74af149b054cea339b078f4c02b60d39
SHA51213b6f240aab7a72da68b45dfdc11740847a328a03c5c544430863400075d5cf15da7e3a464a4ee47ef00ca1c5d7d85e9a6218185d8b7ce4f5990911eecbc4869
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD52ca7405c7747bef35757fa004b3472e2
SHA1598028b20808b5aa95136cd76892fbe425c2f1ae
SHA256888d13e41dd44c856fa1c13c539d287686eca023942c8879c12b5179e770cb94
SHA5121b0237e5520543d9d7c6d6e452bad831e19e0a1e496cf8ee0bb9c1bd9c78dfbaf822ea6c3fa987faaaa6883161327dfb93dae4fb566e38490d678e0efc7f0b01
-
Filesize
844B
MD53919a9fd46b86a5946e3d0804742060f
SHA12d90b1480c8dfcef8e505d4a4735ab665d2bf5f8
SHA256faf4bc2b2e6573d836af1df156b13a0ba07378d35aa97b44897047745968d45e
SHA512bba3fdfdeb6f13ae28a9774c72b7c46225efbe4db81088525f477744bd21f11811d48fadb627bcf8c83927fa490e3d374405b00cb50d1e8652f82b38e3218228
-
Filesize
361B
MD5a5243fba6014b814741032a880c5d9e0
SHA179fbbaa9fe609b25acc8a1eb863769d276221c81
SHA2566dbcd1cdb5ca93cd27597f09b479a5b943837be2f1179039c82ba847242d1572
SHA512525425ea1c5264e8e8d782da3eb36aab1a2f1b4d9d7f00f9eb9f38d502a35697297964cefcb5ce3fcb0a8e1dcaccce12d7c585cfe720d98ae5bbb31e94b93583
-
Filesize
361B
MD505784b982c9dc27f7aa41550bffc7567
SHA15247cf0147769f00f65f2ad57b0ae1868bd707f2
SHA2560d8fd798f62ef6dc3dd1dd9fa3811e21ea2a526468fbe81be4289075d793b240
SHA5126a342c25fd20e14b6a3c06e7766bd22b6346f32d62bcd46c979c339f074735bf68b70d0de400c0a9b6e6182b32e0f945665f67e7dd0a43efee6d89720422b172
-
Filesize
6KB
MD5bc1e695f163095a550dbdc9438a886e4
SHA182667923fc951b276b702d3f032f451d4845cb1d
SHA25633dee7c1c941ffbf05a817ed9e1620a4efaa8db160c4e78532a21f3b09efa054
SHA5120ad6b0f09cdd3087fcb53f2928ee54f52a25816039dc25d8e56d1ab9e228b7e1ce5d8cd6368ef530628f13544dff369c53f7a7531569e92d82c71997b6eea11e
-
Filesize
5KB
MD5c83ea9c6996d60120f082a80b597d0bb
SHA1cc89ac308a92605484ad46380922a8c6a615dce3
SHA256ac106db8aa17cef76a0ef30575969dc9c79721ffab15182f21f42edbb3fcf7e0
SHA5128a132aca9b26d785800acb6164d86b89c213baa01b3467e3a4f1201bcf393582f2d39b7e8a55e306100467cd49afa00226ceab6fcd0029678beeb8d2679e5ab5
-
Filesize
5KB
MD5d6d804386dd03fd168d6b29226b1c410
SHA164e01aea749b55d6316f4be45b2d8083cdfa3f7e
SHA2569ef6aa2360f75e001f7939d01e12729b166647cdb0d9ce4b4bb8bd6be3d4abea
SHA512aa1a25a1b45c7fd224d4b4b88df6cccace51dc0db4def18ab6282cd591f603247c9504dbcda1cfc3b0d22cfebf069fd14fb35afb27771d37883aea2636536933
-
Filesize
6KB
MD56c28d1bc5ea3bbd932c7d6ff2f40369d
SHA192c4865c4449b1a1f660d154e5ce62ff6b538f19
SHA2565433f797726397a8f785539054809ba2a88e30cd11080b4e3e94a30475e0e80e
SHA512c05ecf4cc4204022c4df3912977907388081efdd8348d8470e7e6e7144a75ec35f009d23fb562a6bd5f3c063411be9a90a93396ebe4b29290832477efeb4b142
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06