Resubmissions
15-04-2024 19:23
240415-x3x85sgc7w 715-04-2024 19:22
240415-x3lv4sgc6z 315-04-2024 19:21
240415-x2vfvsea28 715-04-2024 19:14
240415-xxtnrsdh25 1015-04-2024 19:10
240415-xvtwraga7x 715-04-2024 18:36
240415-w8xzwsdc78 1015-04-2024 18:26
240415-w29p4sfd71 715-04-2024 17:59
240415-wkv6dseh4w 10Analysis
-
max time kernel
33s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
advbattoexeconverter.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
advbattoexeconverter.exe
Resource
win10v2004-20240412-en
General
-
Target
advbattoexeconverter.exe
-
Size
804KB
-
MD5
83bb1b476c7143552853a2cf983c1142
-
SHA1
8ff8ed5c533d70a7d933ec45264dd700145acd8c
-
SHA256
af09248cb756488850f9e6f9a7a00149005bf47a9b2087b792ff6bd937297ffb
-
SHA512
6916c6c5addf43f56b9de217e1b640ab6f4d7e5a73cd33a7189f66c9b7f0b954c5aa635f92fcef5692ca0ca0c8767e97a678e90d545079b5e6d421555f5b761a
-
SSDEEP
24576:0xFkFHdJ8aT/iziXH6FGnYhqQuimKC6Qpor:0IdJ1KiBYhsl+r
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
advbattoexeconverter.exepid process 1688 advbattoexeconverter.exe 1688 advbattoexeconverter.exe -
Drops file in Program Files directory 1 IoCs
Processes:
advbattoexeconverter.exedescription ioc process File opened for modification C:\Program Files (x86)\Advanced BAT to EXE Converter v4.61\uninstall.ini advbattoexeconverter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2480 chrome.exe 2480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2480 wrote to memory of 2552 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2552 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2552 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2464 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2344 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2344 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2344 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe PID 2480 wrote to memory of 2368 2480 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\advbattoexeconverter.exe"C:\Users\Admin\AppData\Local\Temp\advbattoexeconverter.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:1688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7129758,0x7fef7129768,0x7fef71297782⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:22⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:22⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3268 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3624 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3736 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3856 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3524 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3772 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2752 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2412 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2600 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3792 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4092 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4256 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4280 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=2704 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3904 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2064 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4304 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4092 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4348 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3808 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2196
-
-
C:\Users\Admin\Downloads\MBSetup.exe"C:\Users\Admin\Downloads\MBSetup.exe"2⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=3544 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2012 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=4100 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4576 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4312 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4580 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=4708 --field-trial-handle=1384,i,13481663359723797383,1755674899872639745,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a3ada5f8afc3d5b036e1ea2b1462c13
SHA11a567b275fd451af1174a61a8f6bc3e33b2dd8c9
SHA25675e58e15b411f22b7f02eb834141723c951630f8aec2650691a72c5cba1ed76f
SHA512cd407cf05d390d5f601b6dffde06f1e72b6045d6ed5c2daf07bf03b2baf8a70432aa0f31537d3e34eae0f7f36a533a2a66aee3aa91685a756120acffc5465e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cbe4bf936016a43f8d30d7dec7351af
SHA169394371c713b223a016dffc74169bb86939cb1c
SHA25696205a29e5203d3efe828e2c8fc1e65233ffed44392e13aafac37f057f9d9fc8
SHA5127d680c758343b19086431776243e15d921a96d1b202c22069461ca4b0610029e5d2d63934e647297f7774308dc2649ee26a44fc0063a55c678ed9438bd2c68ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7376f45d37d31e404becddea5eba4dc
SHA1b2b12599033ebeb6e708935bb45abcde8ed42f68
SHA25699f6217c120b03f2da57910eb5601cb22f7198a83fc8b9bfb1c6002a2ffc59ec
SHA512111fe7bc9e0bb9b0b8910d216f362be3dfaaa30d156cdf650e65afc3ff0270975578d0cd66474a89b3e6afeba812bb0e733aa71766022c26a821d385a6b0a837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eebe52777943901e9af5d342f0d16464
SHA1ede28d5aee2fc6cd8e61b548f3300c266ce9c3e6
SHA256387b6d3eb4765754100dce284276d5935c7d2771aa943c674e3baec65e137964
SHA51259e2e129a26988e12d9b36ec6f94404f999edbac4bb3678a8c447ec38db57026f9b9046aafe00fca61a2a28d51c6ce84f33f40200ea3ee8df114acbded398d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510006f5d0bd218588c1fda3defb4a1c0
SHA1a1527eb03c78e45c1f87908618f8b5639f645db0
SHA2568d6fa55da80cbafdf5a5058b0760396ebd3cbe738780df5926ee850bd8aeae8f
SHA51234d56bcb1823c78c337f5a0937f6512f3bd3b676e7499fd327c6f7e6826a93a236d4d11d4e937bd097f14e6a48e27bc394ff3bbea1f46663549b7dc6ba881d6c
-
Filesize
58KB
MD507aed71557ba5e7e67c1e955093cd200
SHA1added99a1d4ca742e536e351309d6302f5823773
SHA256767e38bf8d440a0d42aae3a041704ce63bf307cb34f54a72f5a6c6f1d5239c69
SHA512f0128ee66899cb0bd68af64fc3aa660c11cc2d49c4744655590e430273bcfdacc8786e78ae860d936866e15b9099049ff4be8bea803da14141825d8b519a95ec
-
Filesize
40KB
MD50f81b6d61de3f11df96afa46fb362f45
SHA1b73925c797fcb5e23b0e0495ebdfb629d16f26e4
SHA2567171337d694e449b8c4923733effa4185a3eddb330b96e9fd0e4e3497faf5364
SHA5121c97e4e7357d385613f05f7a16439c25614d553cafdbd18a197c4a369726ec28b372ec6bed8b87a968d74a2585e3c999da9799e6cf558fa9ce25f87010d0e617
-
Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
Filesize
67KB
MD56e802165991f1776b43c9e91851ffb94
SHA1f9e0018db3292d7f4d33ddd9a326931acab62d11
SHA2566ab5163cda6cb3883035d4f9fc85de1b4abe397025493c64febe46a428e335d6
SHA5124417ec601068f7f5bad6ad2cfb554c7d48f8a6acf3b5b3133e481be4fdaa253dded60d050274ec1b0e009df020c8550eeee5c8ba196d74c5ce5a32da118869e6
-
Filesize
323KB
MD515e030b726ebdaa6fbe241529b989221
SHA168de3b116474a96920e726eaeb174eac0cb7f79d
SHA256df5cce8bbe04121c7c524d5f38bd5351734e1ba293c182547ca7df4d0fa4fab4
SHA51256fc9e5d4e23f0bb86286dd576274a2265b32c9db26204fb3217ef4de0860aaa2593bae8fbc723f4bbe7b6500697d163103c9843ae848e6b3a0971effcd2e5eb
-
Filesize
136KB
MD58a9b23cc7fb0af162ec6e9d9c5febec9
SHA10d8e31f4ecce563dc4cdf7b9875de763a2c1bf18
SHA2567b38afe64db5787f398afd366e84f3ae6ed42ede77c8dd6bc4436ad52ebab865
SHA51283d2a56acf2623b8c291db8eb65f8bc52decf21c39b33faf726a8a665c67cf2e05b79d2202bbc74cc546b2e17184b0c43bd8d463112c4a2e5061c12337ffdf00
-
Filesize
840B
MD5010030e2e65647e40b34f7ab66a4a749
SHA1c8bf9aa562d0ca7ccedc6151e87ce21b622a10fd
SHA25682e2e0b6fc44ff81000e4f48ed96e2d421712b92539823dad9ca1fdd0c71a853
SHA51263ad078402bf674b3eb2a70f5babb4de3f5decb341faa957775d7c88aaeea3650eb5317dae5d21fd6f18d672069904677b5463b9c08ac0707f55bfab9fe9d683
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD5568aa4d09c2eca708b534e7030f46527
SHA12b89fb0d7ccebca8e7e9d85c63bc365855759333
SHA25653a881259a648112fba6be14378b63371716c1812fa473035490c5b71412d0f1
SHA512fad20b2f5beb61ea60a643674ef5d2caed9daeb54c25770b6d65a4d4e39a91ef443b1a55ef6ecbd2390f4fe747e7339cfa97c3fcbd17802c4c730528bbc2afc7
-
Filesize
361B
MD5a0df439efef79d65bd92fb62c9c61019
SHA1fcb83238b7261a540653707906520c5e0c94d278
SHA2567a75f593418c80d26207581176d30bd9a3db1ea2142802510ad9ed4b0eb96167
SHA512f88db02344bc15eacc4673bb3891f0908fd3ed78e6f54db13230d03e7aacab0c06fbe74b8e82ef28d979bdbcd8d5933976fd9fba8716a04da0c4fe1c685ccbbf
-
Filesize
1KB
MD56a015b7ec206c599978ed2b7cf8eeb91
SHA1cd22ae70741e23c5f85cfd7770690027674eba6f
SHA25691325460c881cea6b396bb8c9453dafb271b6660c89fa6c28211fa75d57f3ccb
SHA512ad36aed1d44e837cdf213dd72bf7d87de614dc29570a694bf4b16ee0849a8de34a97518aa6e64cd2cd14f5b0fd1544009c14c58fb0f018b53f223b3cc3110cb9
-
Filesize
361B
MD5a5b9fa99a6191005c377612e81c23cd3
SHA180a9670745dbc77454bccb1f5e81b8197d0a9788
SHA25674158783273f742f60cc9aaaa60662de6dc2b90d95c8185dfa0253d314dba697
SHA512d0f78834e8c96b1b280cd28c6cef1f7b6db8ef4006e46ff9de87ff1bdefcf9986f6a14d8bfcd5a5bf1ca5ba223d679f421678731c05fd18851a26871e5b85fbc
-
Filesize
5KB
MD56271af4a28a5d0c64f9655219f52fb00
SHA12c8d3ee35052ee8dd82d07c3fec0645f95839924
SHA2567923096e93382b0ed81a060c0ff3fa57ee1520827f1cb2a1d1e48706535e3131
SHA5126750c1dbe5d5368f4013c5cc12dd608f5f12e40545b24c168e485a769f6060895ca5dd3492e8b3e9c65ff9f1e18a314a82beb491ed38aa78099b60029f25fa5f
-
Filesize
6KB
MD594899e386b06294f3a6db28adcda10f3
SHA18c4b5433530e51b436ee0abef58ec8c13422dbfc
SHA2560460494ae48e6c1a59c252b3825f2a84c0534cb27f9f422c6e1bb26f73f2eab6
SHA512038f57020bd309907557cfbbd58ea98f47e1b2e899f06bdaf4e0472dcb44b5c9f7189e1c4eeccfa6934b0ac441ba9749c025af81f5c0b571b8935aa729025d9b
-
Filesize
6KB
MD5cb687c527b375aad95665438d0baa860
SHA1eace1b3b36aa06e30ad1501e9e46c2c0423425e6
SHA2562aba5a6bec2a75dd10ba4e85c24de2db0afaf33843c7f2865d3f040764be324d
SHA5124ed4b5863014ec8bdbeb42333a97fbccf9e08f89702f65c2cc72c0b7a186eeb3caea402fa9e7178dca7c0170c56d969840fcbb3e2db1bc252d04ae830187ab11
-
Filesize
5KB
MD546b2eaca5ccdb6aee10ca56346452606
SHA17690aabc8d701e4efcc4012723de1cd1f51a321f
SHA256f59e31611b82bc96bc599ac123272ab1dd91923c378b17bd3d4074efcb178741
SHA512652e61583704f7216789140038bbfea609a5a07f3cf0a513d91683ab8d464da6d7636576aa0832a9fe649488f1b09904a5682feaf258690fb51ccf10e58da210
-
Filesize
5KB
MD5362f34eb568ca473b240ed7d13f4d221
SHA1d0df98c2baa67b888fe3db9b2c224eefb35ae412
SHA2564e90cae378b3e1907ce1cada594620b1b60011309b9ff2180056c5c16119e52a
SHA512dd54dec1455d20ecf0bb0746523b5ada086c5ebfd5ce249dacd7b91e090d601e4d0d1be150fc02db213420792bba30cc2fbb4324dcc3a874752844b561322155
-
Filesize
4KB
MD5fbe04a7fc2314390e9467d7a1cc00838
SHA10198f054bcbee4d8f0a63c71d163d90fb36c31e5
SHA2566ee19a0181074c6e63dcd132b45c77bfebb0f215dca610ab8ec8e37a2708c01d
SHA51292da48743e326034d1f555efd0762951304bd05e6913b7e78ead0aafbfd0ec8ebc5854bc9afc9d96b26eb3945bc5372e9e830cd7026cd5d5c3311bbd5dce8242
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5af3fdfda2a8e4d30f79afc4e9cad57ee
SHA154258e1e2d0d1fa002906cb736c7f2a8392c8541
SHA256313fd9f88898a4c6f0a3b07adee05732b82cc5a770af114effabfa87f66c3032
SHA51240385b7ca59da164e79690a45c4bb42f83496bf95a734ccf601b5c2fc527282662506a8188f030fbb6ae46f26773b9427b7798f7f8a8f81080d63f99589db7aa
-
Filesize
264KB
MD5a6256429333258f7dbe0be2e1f7993d4
SHA12314404fcee3db6f606f1636e8dcfd00928f7518
SHA2563d63c34c46bb1d1ae458ed7863ad54ce325e53e11099a8caf0a5c6e8d4ba7597
SHA5122085dd321ea6104c6de94dcbccfcbae74f9b31993ad5946770fbf12efe24194b861ebab53a9c5b7caaa501cbf0f06edd670d574113366c702f34143440a536ff
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
2.5MB
MD5b6d8b7e6f74196f62caba2ca77a7ae91
SHA16ac9c99f084b5772440e2f135b8d5365f7f45314
SHA25674b0bf9c17091ab1c6c61af0aefbc599f1ecc0fff6dee0144a3dfd5cd1f5e18f
SHA512ad58bc7b626a13606e3f44df7188b2420e0f31ecb55632eac4b6a05dc1574f1ec1b0ef6b52e11832713c6f8f91c807fe3a815699d0748284993ecc54f2823044
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
100KB
MD530439e079a3d603c461d2c2f4f8cb064
SHA1aaf470f6bd8deadedbc31adf17035041176c6134
SHA256d6d0535175fb2302e5b5a498119823c37f6bddff4ab24f551aa7e038c343077a
SHA512607a81be02bde679aff45770e2fd5c2471d64439fdb23c3e494aed98970131e5d677e1eba3b7b36fca5b8d5b99580856bb8cf1806139c9f73693afb512126b9e
-
Filesize
20KB
MD5f78ee6369ada1fb02b776498146cc903
SHA1d5ba66acdab6a48327c76796d28be1e02643a129
SHA256f1073319d4868d38e0ae983ad42a00cdc53be93b31275b4b55af676976c1aa3f
SHA51288cff3e58cf66c3f2b5b3a65b8b9f9e8ac011e1bd6025cadadb0f765f062cb3d608c23c2d3832f89ada0b7681170dce1ee4a0b8b873e84135756d14ba8c69fa9