Overview
overview
8Static
static
3lunar-clie..._3.exe
windows7-x64
4lunar-clie..._3.exe
windows10-2004-x64
4$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
8$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...nt.exe
windows7-x64
4$R0/Uninst...nt.exe
windows10-2004-x64
5$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
lunar-client-v3_2_3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
lunar-client-v3_2_3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$R0/Uninstall Lunar Client.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$R0/Uninstall Lunar Client.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
General
-
Target
$PLUGINSDIR/WinShell.dll
-
Size
3KB
-
MD5
1cc7c37b7e0c8cd8bf04b6cc283e1e56
-
SHA1
0b9519763be6625bd5abce175dcc59c96d100d4c
-
SHA256
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
-
SHA512
7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2244 1964 WerFault.exe rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3068 chrome.exe 3068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exepid process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exechrome.exedescription pid process target process PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1964 1168 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2244 1964 rundll32.exe WerFault.exe PID 1964 wrote to memory of 2244 1964 rundll32.exe WerFault.exe PID 1964 wrote to memory of 2244 1964 rundll32.exe WerFault.exe PID 1964 wrote to memory of 2244 1964 rundll32.exe WerFault.exe PID 3068 wrote to memory of 1720 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 1720 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 1720 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2504 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2384 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2384 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2384 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe PID 3068 wrote to memory of 2408 3068 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\WinShell.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\WinShell.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2243⤵
- Program crash
PID:2244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e79758,0x7fef6e79768,0x7fef6e797782⤵PID:1720
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:22⤵PID:2504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:2384
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:2408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:2832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:524
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1276 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:22⤵PID:1388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2932 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:1916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1392 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:2012
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3680 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=584 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:1980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2460 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:2040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4624 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:1968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4740 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:2104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4776 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:1592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4716 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:12⤵PID:1740
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4968 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:3008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 --field-trial-handle=1236,i,8045238112786154154,8023988564233767497,131072 /prefetch:82⤵PID:1680
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2580
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"1⤵PID:2064
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"1⤵PID:3044
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Setup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Setup.exe" -Embedding1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdf9bda8ad541603a5eb2c83724decb8
SHA17a8611dd1c9869d5cffafd52a443d3d89ffdc4a9
SHA256e54d0a76a71e427d75cf9afc1f0c49845d647498b43f1b6ae31e620c30d16f31
SHA51284817c37c3cf9adc007bb3730b6dad98779017503e6064a36ab07160c1294ac609f265101184821b4505c941cc3f7605fdc09af488550ed30a7fe26f41cf3e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e6dcc36642f4cba676795f3f3a715e7
SHA125e070bcc2d20d7d25bfe6979b44e7f2d3482da0
SHA256e0d738bf1fb721b1eca84337ddd4d7e52d88a5e18d5ae50b9a55595029b894f5
SHA512ca3eed31b030e0ca07d5d95cf22d63e68866b4b70fe8fce1f6ff59109169635a79e997782555e3470586cce6805ed0395dc19a0a8cc5baa8c0771a85d6be1fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591defec056166631c60024ca4b506e2b
SHA1447b6012b8f4a85965c02f65971f5d880f82258a
SHA256e2a16695617b641448de75b9448442d47f6d799f6275d30b44e62501de0055b7
SHA512384502a9c71be030cce2d2968d91d9357987f8c0a4d6c14a4a00e7c8beb05e21aaa9df9c0973c41c700f90fbd289a89e63272fc500edf59c293b17b2fdcbba97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e361b5f69ee6ac3aac55f0a5c62a306
SHA1fa8afd9477188965ab381305bf8cabd117d5c0ca
SHA256417d09573f119d58ce350aa4f96e5adedafe1b81737144c178fb8106aaac443f
SHA512fce69b52c596a672cc1380a122e87088e5f1f016db3d2828c53f829b2cc573f06bc58345821ee3e1cdef6d927a5854dd9763faf543e64e19fea0a745a17e3aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf378439f390db362903df0e6c5338a
SHA17fcd59b83032cc2b235522ad841c1efe354f1203
SHA256adf1a590dbd257d9d5b54e2333c98985324937e671f9685b55b3ec5b74dbe34a
SHA5121394c1810e2963b5a6c5c594be05381b986124eda80283721cbde7396d2c9b7681d61ad36a826d803711cef1fb0b7dbef7b8b9eebf3f4757af8b83e9331783d1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD52f690a36d9db3c297c4f48c7b48c3273
SHA17e984817dde62c3f8dc434de9228b3e8f3539668
SHA2563401bf78622752c4c3a057f8e5d827442c576f93cf5ef7aaf15d58f789dc3f9a
SHA512d0668e2df26d9a4988320a1f635ef93c7e925990634b2d27856207b4c99cf9075791a94eb5eefa8bc39be703e1594660144c7c4d600f75a6d863e87772353e19
-
Filesize
844B
MD52cc1cd3c34a6f1d6d4a4f06d867e3e84
SHA179fbe9f1cdad4cba96a5931f54083b68cd5c82b8
SHA2564b4ad367bcba90d4b2fd4c80601e8368f46dc1e9ae23cdd54fc21d3febd8043f
SHA5126ae2e27c610af20f4349e68fe3cbbfbdd5fcea4b99488c1074e740becada7950624a1521d0957049eaf019d73b0823bb73c0d592930b99e9bace1f05ec1bb711
-
Filesize
363B
MD5424997982a266ecc2cde465e2e6cdae4
SHA100ad371f8409af515d43601680c2f20607eca3a7
SHA25605fae32dc59acd9562e49c1dacb38a1830290cc35b810ec04b541281664ab31c
SHA512668b236b75266a4ea66dc8144b0c1e87b20c743ea95b268a8e7eb4118f26d5891fe80f156fca113e9b320f72d50266862626e12faa6aa13f9766bd8ddd556933
-
Filesize
683B
MD51ee0ac287005c29339a8570408409c65
SHA1563e0f23e2a75b9ee27879e6fd772c6136574dcb
SHA2561005f06414d246ae1728b34f30197aae53494afcbc0df6a0e76de3e3eed12083
SHA51258f95ec16e1d6e8d4c6783422aeb2b2ac28c7ceae443ba3c068d057ad2d1b3759c50379f20d928179c800629e2993af14f4420c6424a6f373cb2c68d5cf63485
-
Filesize
5KB
MD56a7836f215f6e02acdadda00be220eba
SHA16b10b5466b7d3bfc688f5354d5741fbbef25fcfe
SHA256f1235d16dfda7b897a59c75c2ff5c5ec00d472561afa6b52b80723037a1f742d
SHA51232abee466f4c989281ff96263b5cbdb0b6e32bdb20ac6573a1d992e17a2c480748f4728c826ffc9c18e7cade83738b9d6092d5e30f058e57f4f6b461997b4f1d
-
Filesize
5KB
MD5a7ca2f203070f36de2e9258062ced573
SHA1376448cbe77b238ac39264134a7b07eef6ce4f5b
SHA256ce12cce38bc4af6c8e802baea81588fcb6f0a6110faa73709d2f9d1bec530b57
SHA51271eba1db0f5e712f939ff500a05f82aa05199a4001ef7dd57e1a62fdb0d1922e45a044154b8c30687b50aca83157bdb58a4bc75a35e22e4b8c9d937175096590
-
Filesize
5KB
MD5e20c65ff58c09a0d69fa2cf5ac1899ac
SHA1bec4aa27efb0c709a03a47871a2f20e72b6a98e5
SHA256fa214e5d53edfc67e92f5656bc357da565ee3b6160a913d45749eac1c2d16cc5
SHA512bc08b041a5ddcca83dfd7d3870be9870c5a8a88330200639b57f86d3f0e2400fde259e9e8dd2fa6e59d0a5afd1bb73396f1734a49fc65ba31268206c2981c106
-
Filesize
4KB
MD518f64c6ee29280fd1127dcc5e2f91de8
SHA1bbe2a261ce4f884a263e2121e607bd31675f2598
SHA25636e4c843853bb64b3ea518b8870a45b384450243b014db1258f499b4f8d52471
SHA5129d44d91e9daa0462e82be24610c9ace0a839420ca69714691397d2e40e97a954391a7eb06d2f8b8a3e2b2be4f8797b39563a92855f4f512bcb3abf5175ec6f2f
-
Filesize
4KB
MD59a917213b20b0415d90fdd2eaa892df0
SHA1e13780f02649e384de76b9d771934521fafd3e44
SHA2564f44e0afdcafcbcabd42da9db2c26f8c39b5bb453a7925908dbc75a778fa14f6
SHA5128d806c9710d282e26b2127865b43d210c1958a8aafaa1f4dbc13fd38a171bd37cc90a300e2efcd539841bdae025782a2a9aef9462e818532c36aa4bb40ff2cef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
263KB
MD5c3d913c4a66d9f60aafbdd0d1c32b110
SHA195a9b4663d7f6f60688e78237b6b36d65cd54db3
SHA256132454b319ba950a2ba9186ea82ed9ab59333f87db28eef28d074fe4a1c6940b
SHA5120b28dc77c6e7ad2090039cc8de707d8582d12582d9f0cebca27694df8b9ba88a343883f288165a7bb3e0a823b6acafed5cc9c5fff1ca987eae6de055d52b9841
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
5.5MB
MD5fcc38158c5d62a39e1ba79a29d532240
SHA1eca2d1e91c634bc8a4381239eb05f30803636c24
SHA256e51a5292a06674cdbbcea240084b65186aa1dd2bc3316f61ff433d9d9f542a74
SHA5120d224474a9358863e4bb8dacc48b219376d9cc89cea13f8d0c6f7b093dd420ceb185eb4d649e5bd5246758419d0531922b4f351df8ad580b3baa0fab88d89ec7