Overview
overview
7Static
static
7anyunlock-...up.exe
windows11-21h2-x64
4$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...Vs.dll
windows11-21h2-x64
3$PLUGINSDI...ib.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...up.exe
windows11-21h2-x64
7$PLUGINSDIR/nsDui.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3$PLUGINSDI...ry.dll
windows11-21h2-x64
3$PLUGINSDI...ll.exe
windows11-21h2-x64
4$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...Vs.dll
windows11-21h2-x64
3$PLUGINSDI...ib.dll
windows11-21h2-x64
3$PLUGINSDI...el.dll
windows11-21h2-x64
7$PLUGINSDI...tn.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...ry.dll
windows11-21h2-x64
3$PLUGINSDIR/un.exe
windows11-21h2-x64
1Analysis
-
max time kernel
161s -
max time network
164s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-04-2024 20:56
Behavioral task
behavioral1
Sample
anyunlock-iphone-password-unlocker-en-setup.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win11-20240319-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDui.dll
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/registry.dll
Resource
win11-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/uninstall.exe
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win11-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win11-20240319-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win11-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win11-20240221-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win11-20240214-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240221-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240221-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/registry.dll
Resource
win11-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/un.exe
Resource
win11-20240221-en
General
-
Target
anyunlock-iphone-password-unlocker-en-setup.exe
-
Size
18.1MB
-
MD5
04878e205d6d7f7119648d8211380753
-
SHA1
0fa01236f73729a770aeb0e38aa242bea3708958
-
SHA256
a213e0faf45cabad343b34a05a65ef437bed06fdf392a01a25b28def670a70e2
-
SHA512
8bf09c8e4eff88f7534cdebed5301c5c788a717a3807fa04a00dcd90b2d6ac0e1ff2a9bc747779aacb157451e575115829340905063de82ce46e650e58ea9887
-
SSDEEP
393216:4rd+epId4E2HRonQWJI+EOj/zVSOGNUUUIfNeleh/yPxmG:4rd44E2xPWJI+E0/zUO3oe4hKP3
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4796 anyunlock-iphone-password-unlocker-en-setup.exe 4796 anyunlock-iphone-password-unlocker-en-setup.exe 4796 anyunlock-iphone-password-unlocker-en-setup.exe 4796 anyunlock-iphone-password-unlocker-en-setup.exe 4796 anyunlock-iphone-password-unlocker-en-setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 656 4796 WerFault.exe 77 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 anyunlock-iphone-password-unlocker-en-setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier anyunlock-iphone-password-unlocker-en-setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133565650667516666" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 1236 4624 chrome.exe 81 PID 4624 wrote to memory of 1236 4624 chrome.exe 81 PID 4796 wrote to memory of 4752 4796 anyunlock-iphone-password-unlocker-en-setup.exe 82 PID 4796 wrote to memory of 4752 4796 anyunlock-iphone-password-unlocker-en-setup.exe 82 PID 4796 wrote to memory of 4752 4796 anyunlock-iphone-password-unlocker-en-setup.exe 82 PID 4752 wrote to memory of 4640 4752 cmd.exe 85 PID 4752 wrote to memory of 4640 4752 cmd.exe 85 PID 4752 wrote to memory of 4640 4752 cmd.exe 85 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 1860 4624 chrome.exe 86 PID 4624 wrote to memory of 248 4624 chrome.exe 87 PID 4624 wrote to memory of 248 4624 chrome.exe 87 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88 PID 4624 wrote to memory of 748 4624 chrome.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\anyunlock-iphone-password-unlocker-en-setup.exe"C:\Users\Admin\AppData\Local\Temp\anyunlock-iphone-password-unlocker-en-setup.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"au-Windows\",\"user_id\":\"B7EDC6CA\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"2.0.1.2\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-G1ZWRJY8K8&api_secret=TQ-BdekiTo671_UiBfGprA""2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"au-Windows\",\"user_id\":\"B7EDC6CA\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"2.0.1.2\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-G1ZWRJY8K8&api_secret=TQ-BdekiTo671_UiBfGprA"3⤵PID:4640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 21162⤵
- Program crash
PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff74f99758,0x7fff74f99768,0x7fff74f997782⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:22⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:82⤵PID:248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4960 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:82⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1136 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3420 --field-trial-handle=1808,i,7411568800867888881,17900604265515627529,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4796 -ip 47961⤵PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD59b6db1ab38d6a6d2da6a243f6c535959
SHA15ad7f03d79e9f8da3027d634cdb987bd7ad83643
SHA256f8ab0227091978f14c8ef610aecaff032714787ebce7f213171116cadf14ba15
SHA5122718d224fbe706724bfe59a34cdfa6d657a3014a779a4c602419dc8d63cf1856608d3087d68d5ff6983c76a5633d2c35310278b49dc3f914166ff448a52c509b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58553b31a1a7cf2c69c30b27996c369f4
SHA1c675104ca2fc82ed07e90f7e52dbddb8221e8d7e
SHA2565b64a64a0e8bddfe74a9ac2d28314b0645ffb23930d968087706db88484135a1
SHA512478369dd8b22c5aa9f0b991ade5354fbddaef6c832b6f8135f070570aab34d2c7952ec1f46125773c0a7ef8ba23e30c4ed59d8237d1e29217ef956990acd4705
-
Filesize
198KB
MD5cda68ffa26095220a82ae0a7eaea5f57
SHA1e892d887688790ddd8f0594607b539fc6baa9e40
SHA256f9db7dd5930be2a5c8b4f545a361d51ed9c38e56bd3957650a3f8dbdf9c547fb
SHA51284c8b0a4f78d8f3797dedf13e833280e6b968b7aeb2c5479211f1ff0b0ba8d3c12e8ab71a89ed128387818e05e335e8b9280a49f1dc775bd090a6114644aaf62
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
289B
MD54a9a3e2f870e3b77351b2c2621342175
SHA18188266972b66e6a8376a743a750bb1dd907d43b
SHA2569e60d620ebae052ff53ea83ef827289f805eac5c224bd026124ead87e9218eba
SHA512cd077d909ceb462f11faecf2ab90dc0cb13eac5eb2a268e66fb7c2502eb2efedc05f524bb7c7aa61be97a269eff68b501df0efbfebb81506f118d3a42c474871
-
Filesize
328KB
MD5396170adc3252eca4c446029ebae6f18
SHA1d0d9e2de09051ac43afb100c1360bda87ea29d69
SHA256385475228cafa8e3f450be3bba7a000e01ecb9cdd10fa2a3153f4872b753aa6a
SHA512958565cce569c06b687c8761467b94ac63066c3e4d9f237755166a1102decab2ee9064326e76a9331fde974105f52e93f3b5d0f5acc860e30587811e79026928
-
Filesize
168B
MD50f78d192563e20aba42844f5dc4fff97
SHA104e11fa9755bd70ddbbb0959e9489ec76c53e6a7
SHA256b698bccdc44c27fc68fa61f0776d50e3b046259b814fefae84cad441a4f55b4c
SHA512037cd9e02a6cb0be06b412a4d56745df072b990311f06119a2a25542338db1910fd79a298e9c36d30db297bb3c0dce9b9fcf0b09395d063583f865b641d737e4
-
Filesize
168B
MD5bf9fb471600b83b8e9eaef5b738cf71d
SHA1fc78ac5d071b95e1669dc8219746beb2ce505734
SHA256813b1bb88bccf0e1eeaff8a4fca2e46730e6b2bbbe16339a5dd03e9d94c10111
SHA5129bfe39b47a6957947e26f268c865b8e6f3ab8033c7b7d0a1bfecac10eb18e71e54680caa094a49adca81ff12d5a6ef73722693d708178a902973ba62f66c9dda
-
Filesize
1KB
MD5697b634f9757b9882d33390e154a034a
SHA17d9069c5ca35189c6504668ebc99f34f8359437e
SHA256ca8e074c6e52a7afa81379ed811e2df30e832602e11df5937715c5ce0894ab4f
SHA5123ae31c1d009611c59f72d0b6b1121eab501232d7c3dba53c7a3ca5d93828111cef49b29f3f3e008feccd77db8e0040dedb8162e3002d50c633d1f2a2c6ec2239
-
Filesize
1KB
MD5605a11f1d85dce7073d31191d737aa05
SHA141e23d6082501f10b93f8857de87869d81e79c6f
SHA2568d92bac1c5ce13c31dd4749b7c076b2c88e980bb74d6ced4d17bc8975a8fc316
SHA512393b35346bbb79aade7746f08cabd9d1df6e5acd223b624656e744577d633017f55aa6d26dcc1d519a87e500ac8ec3705462f83942b24800e302c7bc3e88e909
-
Filesize
371B
MD5e71683d0177f5e6d5db1581fc82b9b77
SHA1842aff72b22763540812b2683ded433721d4c1d0
SHA2561c74a834bae4d7da5c4c78c8f4c7abef4b6e384b9b4ea75edb95360adc2b835d
SHA512e941ea3f61b00d7a873ea625c6044de3ad0a954f68cbf8501be714dcd311fea5aed580c94bba42ed81942330de9bdf57c1512e34987fdd7d49f2ba5955c6dbfe
-
Filesize
371B
MD5336a9bdea25b707031f707bdc96975c5
SHA15019a620609ee81e5fdac0aa60da92e27213bdfb
SHA256bde6e6c0bb0ef61117885909aa96197d6c9ecd378295614fc611a00226ec598d
SHA512f3c1c2e09377c2a51110d10e36398e20d47e935564aae0ec57f86710ad0c3d3b3fed0146c34bb142c7ea321541e9d8e69f3af00e75210bfeb516bba3625681ba
-
Filesize
6KB
MD5fc51f9c2475457cc972e67877b7ad59c
SHA155894b29d20c11bc219414d98255c4390a942b9e
SHA25649901e5e3593b624fe87495bbe1d1e66dca566722def7a623bccf9c0cd22c071
SHA512b8bf78990900e256cb7d7f9e10085087cf17405432f9af78b58a4c83d039a6d11ec5d7f4deab93ee7b77ede0dc9185acbd4345088c98a54aac3f9538685ba51c
-
Filesize
6KB
MD5f3a8534c875e81bd8c0bc723031b4644
SHA1ea587e322ae1f582b1c404b3b0e6d049beca4ef1
SHA256651f5b3951b605c1852e6593ab0e1de7e3c3fbba3071553d3b243a1319c024de
SHA5126db8aaf2a528b9e2c7bba0fc28eefcf2556592c0ca7233333b114e148d5229c4fcdf610687fbd226db58157ee850f111d3c76a5810a1b9ffdf7d2607dc8b7ed8
-
Filesize
6KB
MD581f58b4fd94a700cf67f79569e1770ee
SHA1d0627a5cd0ea3524002c5a90ba5322326f01c8af
SHA25655e91a900bd8712abba695a5cb3b40c1248a8948209ca8c03e975484486c4bac
SHA51220c974efe525cac155724815992fbd13171a4681a7950b3963fd24c668de50a035a9ade0cad9a665c0174de246228e8738952469c911844c1012445ca95cc717
-
Filesize
6KB
MD5bd4072f8aad78b581bb6b33f5b46210f
SHA1d9d042d0309abeec8d5980321d502222a3d18867
SHA256f82ec6bf25cbd47593c5b19d7c1acd45bd125edc031d8cb0ff803eab443587af
SHA512c7d18fc49b04f79759ef5ed26b8c8a120e6e2d77261c6b2a5564c0cf832fd26b5f0f51740636864df17052462d429c3dacf21df961ba0615a2665c556570cbcc
-
Filesize
6KB
MD5b3effd40daa8f2333f2e65ca03ff0594
SHA17c98d26ce4875ebb3dd3be11852a838331d3d529
SHA2569037a10f544a85aaab885e69d00990910230d246dc2dfaa4c77099d0b1544577
SHA512218cdb148e8889b78a6ddbb373e0112115b182a8c95b38f28396af856798cd3c3e1caa7611e35d4e28bb5c1ff68067bacd3a47d21996416c74815af455bcf31d
-
Filesize
15KB
MD5e4ae6f107149197790a08557b263e11d
SHA104875e5cd2f288cdd75c4f0042e7cbcb962f6c46
SHA256b6158388163e1dfcac7ca8304eca8c6de1988a3eb6434083d819e16132528ab2
SHA512340e096bf649a253f3915587877c5ddf768710b74250663a2891df3356e37fce97c26ab4f21315d32c0fd978f3dd8420efa74ca25a0626901dd116afd34ce89c
-
Filesize
260KB
MD5b61075c3fd7b44f6eff8b4171db9d031
SHA16f3e60159f9b3c03e8acc4f40fabecb35a30abff
SHA25642d3663309668aada7f1d3aa3ccd925cb46556e479cb9722ca9031589e3c759c
SHA512a2e5643a52c1f7e2959758ececac7ad5dbe15903b18391ce178b1adcf6ac21449b29a99d5a3a7f70fe9cdbe9861767bd6ab6c314621ccd47d74c9c27c668fcfc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
7KB
MD562e85098ce43cb3d5c422e49390b7071
SHA1df6722f155ce2a1379eff53a9ad1611ddecbb3bf
SHA256ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2
SHA512dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e
-
Filesize
36KB
MD5d8fca35ff95fe00a7174177181f8bd13
SHA1fbafea4d2790dd2c0d022dfb08ded91de7f5265e
SHA256ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c
SHA512eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
5.8MB
MD52eb92cc54285af5f5693119080c60ed8
SHA1b680f79ca6cc219ed877fa10437e77108ec7b7fd
SHA256b28363bd1075dbd2e94e5fa22943a98dacdd53a2fa42921c2885703554d9c586
SHA5125c66d50e5c45392388b3490875f0604a5c05ef0591238c3544fd410883a8455c229f1a8cd147c26fb87f56ded56cce853261b06ff8454d433f39f51b3035a6ba