Analysis
-
max time kernel
43s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-04-2024 02:24
Behavioral task
behavioral1
Sample
Ro-exec/Defender_Settings.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Ro-exec/Defender_Settings.vbs
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Ro-exec/defcon.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Ro-exec/defcon.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Ro-exec/loader-upd.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Ro-exec/loader-upd.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
Ro-exec/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe Token: SeShutdownPrivilege 2188 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe 2188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1896 2804 WScript.exe 28 PID 2804 wrote to memory of 1896 2804 WScript.exe 28 PID 2804 wrote to memory of 1896 2804 WScript.exe 28 PID 2188 wrote to memory of 1856 2188 chrome.exe 32 PID 2188 wrote to memory of 1856 2188 chrome.exe 32 PID 2188 wrote to memory of 1856 2188 chrome.exe 32 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 2196 2188 chrome.exe 34 PID 2188 wrote to memory of 1932 2188 chrome.exe 35 PID 2188 wrote to memory of 1932 2188 chrome.exe 35 PID 2188 wrote to memory of 1932 2188 chrome.exe 35 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36 PID 2188 wrote to memory of 2288 2188 chrome.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ro-exec\Defender_Settings.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"2⤵PID:1896
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5159758,0x7fef5159768,0x7fef51597782⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:22⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2092 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2100 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1324 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:22⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3332 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3552 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3668 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3688 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2676 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2784 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2220 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2292 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2644 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3816 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3960 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2724 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2728 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3928 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=1212 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=1964 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=2728 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4512 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=4596 --field-trial-handle=1312,i,5269985009564723902,12368536744703902439,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2320
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:2368
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵PID:2240
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2248
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e363120611b2884977b239dfda51bf8
SHA1d83e27d916cb87369d6f3315110f33a5d6b89cc5
SHA256d6786f193611846028ea314a9e19b4ba3ec0e472c7a8428be73a2008cbbbf497
SHA512a14c482a0b12ec952cb13715c415f106af6e8ef4909dd1adb5ce04654c6c66da669e2527f8b36bf317e75f15f17cc4ba29f5b8f8ee279644eb9cebae9b9c836e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a56badf65d0aeb39d05ad82ec8502f
SHA13e3c9fad340837bcbfa3072e31d06cbeee6f5e7b
SHA25648dca08dd180409007a771026d4235ac8d24a8ddd4a297bbd38d5d28b4f3e80a
SHA5120ce4c030a46b57f51ca14ed7fdebe79992cbe87622c086a18cb924c6e3766782affe5936984925f29bc4d2480e8b4ecce884e4a247a41d2c46b066dbc3348ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6054f3cd881bead2825c0fb74b0b99f
SHA110350c3c2dd480c4d29d5efae2e0cf0a015d8fee
SHA256492efcefd82356b99b3579b2435ccb32af70c81710f9c3bedc009260ff0cac56
SHA512040a05e50b100abd5ad52c09f75e28eeaab309c6ea1b7fadd4867bc20e5371a1e37a28f743716acacd0a63841a8102515bb37d92791b799982386ea0ca8b1c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57237c51dc68969607d0f508ecb4347cb
SHA14b364d022dae696564106e3cd8831475533908aa
SHA256ef9ec2a3c878cdd8c210018073d0b20ace6076f30bb5e1c904a780c452e613ce
SHA512bc90197774eef06e254ee40ea190259dc36231fcba26f5dfcbf16ea90bb7705e976ea077b1dfd2bad04feda29af1840320fecb491dd6799c8459a1b595936c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5face3b39a1cf6ad7bc91221c06067dc9
SHA1de335348a0ec7d36bf6574932485d3afa2231f6b
SHA25624c584814a5c1ce85ab18fa0c0d68671ea53cd53e68d0004bf3e11c24373475d
SHA5123cc31fd80d658c9fa11d40cad3d8fd63daf19fecccb56f0d04c9764e6462f8f439ed1d93a15b6bdc1c150fcc37536e6e356b25a7e848965ed756369773d5b53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a8bf18c8c527a4a7bc0b0b16fcffb1
SHA122fa26e16d433280ff56a3d8299f03c4d774a8ec
SHA2563e484e5f78d7682a58d7c91d9884e29b3d9d0d05200d59a49db3d52f52589e95
SHA5124d54a0364548e08fd65c5e169661848af2ac217e05e423202fd82bee62baaaf927f9f5fa483712c8b5f1e445b9468d7a9ee91088be7786148f0b6ada47e3cf1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55de22bae924aff2f05e0828dab7e5713
SHA1e220b35474d4960685b0c5a981ea916c1e0a2243
SHA25671c0cdf1630e76829e948e2a6327008e65bfe15f7e7ac7dc332f8f3ef5ef1378
SHA512e55d89d9050b80bf642c99d30d8573ad115197b732b05b728be635be241557a6811eaeb369e09da8810b658514317d22334da40e5ad5f3a4886ca8f80cea3bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2fdf3f7193a5002e1daa3c6559f23c0
SHA140d11c79776a83fbcd4d24dbc4cb1dcc96cf7766
SHA256c834eff1d1e01cc786c74f16476ccb0090236061557307be71f4f18e90a8daba
SHA5122a7cebdd0cc03a853c8250ec63b53069126212aed9c7bf575a6cb8e30483951650f32363969fa8c38cd11170d3cdda458d8dedd3ed957ef6d84b5a01d7c57c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5602111771b809f2826fb731293a7b8cd
SHA1753ee2fb6d3c022aaefa6cea4ffda8a5510d6d4c
SHA256ae60b5133d498e579136d3f01eb0db3da12079292956ef800627182753427498
SHA512d0962cc8aa29e91f0f756ce369cb87f8f9cd0f49388d8fdb832951af903a0880c80af0ec9d547aa9bc55dcc31c7ddd22282f98750d46880226c06290431dd360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540262dce3f3e1c2e2e8f979b8dad01bd
SHA14e4d56c8bf9b87d895f6d4a5eb50d80db3401e71
SHA2568aa66cc610dcc01ee24a75a58f803a45d7a5422ae53e77f30fb48ca00aade3dc
SHA5128f7ab62fd04790265cf6303c0874f1333477942b0833ad8ff5289635582e5ad52a932c574028c237c9708c333b345ec32b2ce717b1e8201a8c80ef797adec1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1b6abb47561ff683093b071284733c1
SHA1334e37175b55a57f76c06da92b14bbf74262b14f
SHA256edbd6c533f3ffea18249024f479ce0c3745a4c95f4b7c6af7c349d6e0dedf2bf
SHA5128a082b24d6673af8c40588420cd7873313ae9210db9e277bfcbb363f8a93c148035a3b7a6298d2c8c5c3cf0f4afca8d5a8ae819197ed7733e9c05dc7509652d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2a86e9da-f4a0-43e2-8d9c-6564fa750881.tmp
Filesize6KB
MD593dc9abeeb32a092f2ac464bd93cf668
SHA13499e209a4ec82c99484cb24c9f2adf10ea691ae
SHA2567bb55ee35255f5bab98c4ecd3323e97c3d9bf235dac2ba48e1596420b70c0eee
SHA512e012a249a3c52a602ede56a0f0277808cf35838cee068a24b134222a64828f9f51d51acf4684a11a19cad5f283464142bd0bc74d5402190d886d35cfa0ef4df8
-
Filesize
67KB
MD56e802165991f1776b43c9e91851ffb94
SHA1f9e0018db3292d7f4d33ddd9a326931acab62d11
SHA2566ab5163cda6cb3883035d4f9fc85de1b4abe397025493c64febe46a428e335d6
SHA5124417ec601068f7f5bad6ad2cfb554c7d48f8a6acf3b5b3133e481be4fdaa253dded60d050274ec1b0e009df020c8550eeee5c8ba196d74c5ce5a32da118869e6
-
Filesize
323KB
MD52e6f924fb285f9174798ce8d7f16b7da
SHA17ddae16062f53226a60fcd24980dbb862e4a095c
SHA2562979a0e96407b46e057329071b9eb5a11cbb8266e653ba982d0a45db7a4b0c98
SHA5121f0da4009b0a3aea7831e7d4926fda276aaf0d0561e7b99a2cbbb382dd17b40cd8e6e0edfd6532089ba4e8a815e9470e34422c3904bb750e008b5c07931c6dbe
-
Filesize
136KB
MD5c4fe6354ed0afad7ae6bf84a2d33e1b5
SHA164fd8625cdeacd52a456c39d219439ad9b78c51d
SHA2563081f5764760204346ff3307c2eaef15d07673fab0a7f475c3debc20cc5b5821
SHA5125d41d94a2d126fd1abaf94f2ca7497178f5e6efa58105e6b15bcf202d487e2594fa2af5a228cbddd0d22699d3b3fdd61a4539c71cf1647ed9106b6567d270fbc
-
Filesize
66KB
MD51e3866fae78400e2271411d54c132160
SHA115ce0b2c130b987ffe9376c47b6c246dd44c32d1
SHA25600a918386aea10ee2c25d529038843c9f4d70e61a7e2578c3aceafd81673968a
SHA512e50bbcada0323759e3a6a796a6455d5a6e8bb613a1f7d5e0b86ccec95df44139ab9d3c5fdc5649853532695fe7135037b0ddfa4757d742bd94d93da4303cb4d2
-
Filesize
88KB
MD5fc9b7b2f7c3842cd65139693947bdfe6
SHA129edee0b6b781d39b66600b147514e3167eff896
SHA256f85922e3bdec6aadc383661be728f463d659bf32f22c41b49f6e57f47588446a
SHA5129cd3f29c1046d61560053c548d118128ca339b2f853a6ffbc580ef22357fa47092bd01eea8b6e3f965ad2f8d4bb98d98fa2760285baf250d909f821e4d0e373f
-
Filesize
142KB
MD5cac1198e196dbeac3e2101de8d7f5268
SHA174796d5001d853144dc2e24777930ae3637038b2
SHA256daaef7ec70abd50cacfe4f6c99c71711ba9229f71279dfcc6e8b2618cd548349
SHA512a23a85bf9d323c2f244d47398be80c17d0a15499605b51c20c01489ed0140a3d48ddad110dff412df169d682f8332c61b46a825c22e8845c09251ee17c109d3b
-
Filesize
46KB
MD56521186eca53c60c664f23dc5d6d654a
SHA13aa5426ff1312f11da6c37296c8248934e926ab1
SHA2566d1cba64eae8c4a8b193c57e7883feb47ac68ca67ff41d5fd90a7cff1b40b135
SHA5124812fdf8329b7b2dc1bbc9cf43f945bfe9acd5153d5e1c858ca5196e0cad1735000b838e6a82ad606d7a71cb44a69a8e30db36a810fc902615bd3287297b3a82
-
Filesize
26KB
MD5086122a4bfb7a51510e3f0f0358446c2
SHA1409d7940193c0a6201fb28376f9ca1ec4e09d979
SHA2563c982a4b7283f4a728760190c40feaef16cceafab2f04f372c7848ff1b65c270
SHA5121db1eb3cc8fa2fea162297b95d6f9d5fff99d2ddecb2e5a70eee014585f6c51550816dff2b295aa268e7040c5414c89c6c7d45f0c924a612dd98ff4e7974c309
-
Filesize
70KB
MD5289b60b19894ac872106d034cd6e0532
SHA1d11a41ff9e09f5485daa054f53eb829abcd0bd8d
SHA256b6732aaa59c025f5770d6d93d9b33b594dcbfa935394873855cf80651d3dd114
SHA51232de006da963e4a5bd1e330bd83d1e08fab230efe9b278b73efc49a2473f077258e6774cd74244d74f5f36e83dccd4339ce05f6575b882834424a04dedbfda26
-
Filesize
100KB
MD57989e13cfdf072c12b38f6e0a49ecb40
SHA1c2f57a5ca2d8904ed22b6d381bd13ffda836bc23
SHA256bb492791d65f75c1d8051357b19e1bfa10ef221f2ff0495c7d5bd6aa2cd803b7
SHA512835f441b7b685fedbc2d9e40d2fac119e6d94177963b13cc008eefedde2f83c8e08a39f39245d4b97f56e8f70eae634c422493974ba06740b4a8c178d383fcd0
-
Filesize
24KB
MD52763764dfde10eb91482b385a0dd9867
SHA1872cb4593ef3a13c45817added8dd7faf92fab65
SHA256d3d35a89d9df3f3f0dc8f26196c5288761f11ba525c04c74a1e23739e0835099
SHA51253aad46e8550c6482705c0df9d9d89421c2c2f6b846fc559bcb1ea7bcc566839275e6ae6364815fe7c8fe2d6aefca2572085199332a896a220890888f9cfedc7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
845B
MD51642a75552b2cf61d79ce9bb74612590
SHA1f995ff92549ab45dae5dff58a6be5ae119a55059
SHA25607a5a59f8c1bbf36c26911d817cf0f313f62a0b5692667dfa7394d204e632060
SHA5127334562e18443d174ef1fe86fa6a0ca17efe4a6f0784129cfb6c4e39288ba96131826adc0e8fcf11f7efc77d91022da533ca91b1b8273cd571767c882b88fb27
-
Filesize
361B
MD5eb58b5d99d179dd348f3abb4df0d827f
SHA1874eeb039ea538e8f93e1d4d8883d58b2ebf6494
SHA2562ee48e85eb06ea814fa24ae864f437d9470f945a10f663051df8462dfb8f283f
SHA5122e77527feb4689535dbdc8d043d368834f0af6c3d06655799f34808cbd56e7e1aa95b3e2df7fb50842899f14a2a0c8bae55fc07fca3509d5a30e056ba8e18c70
-
Filesize
1KB
MD522b372a92fff5974d697e2c16c8d2d7b
SHA10bb746a56a66e5fb2b6d176cc0b920f7e0c032a8
SHA2567c55d72e4a97c6a054eb5112fed16ba18f30db0c4cbf0788cefbc69c0feb2c67
SHA5124e8735e8cf345ce45cc7d3627cc694fc1093d788fd7ed7d5ace076dd9b6a2f6be5773bb4f83be79be493de880f1680e1f4677f78c9de0795dfd784462f353a31
-
Filesize
1KB
MD52b60f1308a9981b432fe4baa9cd5efb4
SHA1b94fb030356290bc1f7ce33d57fbf56c9c3e7d99
SHA256cef9b7c16c4c507fd529767fc74738a409eb9a1cd26d7cee64ab3dca4316ba1b
SHA51290634f9517b179f705042b2a072c657e487b9f30fef5c82d12332789cf423863481d225e60c54bb018178de1c0f052648583b98b7c0f196f11fed8e93c408d3c
-
Filesize
1004B
MD59259479c42e7b09e90c892a518e83f21
SHA1123d98f094e263a001c31bb38b21a87c6c1d3b68
SHA256addeb1e14c0b84c165a2536c01c9f205c00cd531762bf41b464ea0e5e9752a3a
SHA512ed59f5312ac52c1d32c6ef942c69e4844a26f9e25466cc1771cde793d8b11cc502141cfc882a4037640ffd0c0b19778b248c67be6f43ebbc82c947116889db6e
-
Filesize
1KB
MD5c8b63c229c39d4ceb2d538a90a0b26d7
SHA1ad27bc2f6b15048735e6bc6c3f24246e04c9fd80
SHA256332bc52e177bd98b30f71bf0cf359146c0b1c0c902b004c6c3f40e474731ab05
SHA5124080a8e9d8e4b261f09eb00fc10c35c64c45f3f2c45a438d1c721dd77c26abecb5e5313e699f4e1c6e8f9b49b98266c83e67dfd7f33641b7375b49d03cb94e78
-
Filesize
1006B
MD5a254f6969a45de3239243cd068637451
SHA17125d1e3ea14c13059bfaeb92f6f0cb2ef38752f
SHA256afce7c70da529bf95e6e6f6acdbcdb180768c9a600cd20287223026cad916614
SHA512831b20a32994d86e061a21053f104fe0aa73c2bcb5d0ea32a51bb4984d2a799418b6eaf6eea1757fe48a3ef6206025dcfb20d98dc362a70723160355b1acaf03
-
Filesize
5KB
MD56c43b07118abf536d417e3d755883000
SHA1462e6390cdccf25cf85240f760c7c36e86b5b1bf
SHA2562b0d7514b7f9c197a509858b942d214d6fdf285dbbde60d6a20c2be30264a843
SHA51224b3b56d1699b91f18aafbd0a333ae2170affefa0ba1f5b77601850054aaaf93f8a6e762c0f566070fd465d5c0d82f3eeef4fae63bb93017c7dc07d871d71142
-
Filesize
4KB
MD595a3eb54fa6b1b72a1f2e61068dc6253
SHA1e2e4ca2955729cecbefd66085db9701dda491921
SHA2569e1aca1cd23dd7a802d64bef65775b5d8426948e7ae173d26d2b1c586ae92d25
SHA512d00931ae59008abcbdc0aca5917ba3e924375d2258791629a3fedf675afd00f28f2940fa65559950639a51e2b52866bd903ebe31ea8891c4e84d19dca7dad2dd
-
Filesize
5KB
MD5328ca25d410737bb8fbc044b2ddc84ca
SHA14ea13aa1eef4a9e9a7eccdf12705b7c192eea5c7
SHA25679f64adb9c765de90654595335015cca75f1cd72d82e6090de7aeb70c7c1ebdd
SHA51280a5f6ba87d0d17c3de50e80eac7ca34945b0e5d28a31499b0ac953344d84ea0a9915dd532b870075169d35bc496c636451390878700f59969cdd4dc15382cc2
-
Filesize
5KB
MD51e9a130c08cdfb1a0138c59222ba7e92
SHA1680fc69e6215d0797632be083929c81627843458
SHA2560fcee506a42d42b374c2b2ab02418c060191304c9cdb299ccad433a382383eec
SHA5121c05ed707fc0be61322754d507e16e0a50bba37087396e114953b7ab6e16dcd335c701c1177be6770a872fc8b64e9b69d4690c32403b303566f846b72a5f19a1
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD538024d536e9836392405b62722037629
SHA1f6cfe5f14edb081ee44cb6efca282c20d1e793af
SHA256d1f2890795e4ecebf9db41872c250dbedb4ac87ba3774cfcfe44b6d8c58398aa
SHA512ce37a56cfefe36f296487e121f86e7aa43552d86c00c9ce7b58f428cf214a48604fa52364d74655207cbcff38856f0f1fade53c43d2de5b05f7edddd13e7448a
-
Filesize
264KB
MD596ed979a629798c5f2ff6965ef9ff0c5
SHA1fb59278c8a75cc681f1692492a254b3696300c3b
SHA2566701df316fa162712af83f9c4704d9bc35b10857b0ea6049443b33434f1232a5
SHA5123fdb93b5c40e905be64328f6aec925c3f7a11205c532733471f7fd14876104ae05ef60ce46fd0fb479c5f25112720c31f744fbf77f5c6c98dcf66733f8070dae
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a