Analysis
-
max time kernel
14s -
max time network
44s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-05-2024 03:54
Behavioral task
behavioral1
Sample
31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe
-
Size
1.8MB
-
MD5
6129e62103a91193f06c705f05b1ef68
-
SHA1
d1ea2a4ad8496a30bf51f8aa0611afd8480eb7c8
-
SHA256
31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246
-
SHA512
56dc1e0d5851bcadbc0a0cffcaefda5b3d64c7cdb88bcce3f00c476888e17e913ed1610d2b0e5aba0c275035b1ff0838b09f078b79b4229af9dc1f74bc5313da
-
SSDEEP
49152:3V0AAc5A/yn+Y5UKBCwxnsDKWp4DH8kDi5/AGIOU:F09WA/ynr5UepxnWg8SgNU
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
redline
Test1234
185.215.113.67:26260
Extracted
stealc
http://49.13.229.86
-
url_path
/c73eed764cc59dcb.php
Extracted
redline
@CLOUDYTTEAM
185.172.128.33:8970
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/1028-473-0x0000000000400000-0x0000000000592000-memory.dmp family_zgrat_v1 behavioral2/files/0x000100000002aa64-506.dat family_zgrat_v1 behavioral2/memory/2864-531-0x0000000000F20000-0x0000000000FE0000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/files/0x000100000002aa2a-173.dat family_redline behavioral2/memory/4596-188-0x00000000006E0000-0x0000000000732000-memory.dmp family_redline behavioral2/files/0x000100000002aa64-506.dat family_redline behavioral2/files/0x000200000002aa63-512.dat family_redline behavioral2/memory/2432-515-0x0000000000DF0000-0x0000000000E42000-memory.dmp family_redline behavioral2/memory/2864-531-0x0000000000F20000-0x0000000000FE0000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2192 powershell.exe 1248 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe -
Executes dropped EXE 2 IoCs
pid Process 1252 explorta.exe 3104 explorta.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorta.exe -
resource yara_rule behavioral2/memory/1472-3-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-8-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-6-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-5-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-4-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-1-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-7-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-2-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/1472-0-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/files/0x000100000002aa12-14.dat themida behavioral2/memory/1252-29-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-30-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-28-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-27-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-25-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-23-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-22-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-26-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-24-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1472-21-0x0000000000900000-0x0000000000E5E000-memory.dmp themida behavioral2/memory/3104-37-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/memory/1252-63-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/files/0x000100000002aa17-103.dat themida behavioral2/memory/4080-117-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-118-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-120-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-119-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-121-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-122-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-125-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-123-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/4080-124-0x00000000006D0000-0x0000000000D57000-memory.dmp themida behavioral2/memory/1252-186-0x0000000000F40000-0x000000000149E000-memory.dmp themida behavioral2/files/0x000100000002aa61-485.dat themida behavioral2/memory/3444-488-0x0000000140000000-0x0000000140917000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 43 pastebin.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000100000002aa1e-154.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3104 explorta.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1252 set thread context of 3104 1252 explorta.exe 78 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 248 sc.exe 4488 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 248 664 WerFault.exe 82 2248 3424 WerFault.exe 124 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3104 explorta.exe 3104 explorta.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1252 1472 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe 77 PID 1472 wrote to memory of 1252 1472 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe 77 PID 1472 wrote to memory of 1252 1472 31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe 77 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78 PID 1252 wrote to memory of 3104 1252 explorta.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe"C:\Users\Admin\AppData\Local\Temp\31b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"3⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe"5⤵PID:664
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 8886⤵
- Program crash
PID:248
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe"5⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\1000073001\swiy.exe"C:\Users\Admin\AppData\Local\Temp\1000073001\swiy.exe"5⤵PID:588
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe"5⤵PID:3020
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"6⤵PID:3380
-
C:\Users\Admin\Pictures\Ert8hM4u2KkmgDuuiKaVP7iV.exe"C:\Users\Admin\Pictures\Ert8hM4u2KkmgDuuiKaVP7iV.exe"7⤵PID:880
-
-
C:\Users\Admin\Pictures\rHT3RkSXBywdAEVtC1ok3wvS.exe"C:\Users\Admin\Pictures\rHT3RkSXBywdAEVtC1ok3wvS.exe"7⤵PID:4640
-
-
C:\Users\Admin\Pictures\BGfVIDVmaJM2CgJoMhLSfG8P.exe"C:\Users\Admin\Pictures\BGfVIDVmaJM2CgJoMhLSfG8P.exe"7⤵PID:2396
-
-
C:\Users\Admin\Pictures\w3n7xjldcIZhWMz8qSDcrJ34.exe"C:\Users\Admin\Pictures\w3n7xjldcIZhWMz8qSDcrJ34.exe"7⤵PID:1176
-
-
C:\Users\Admin\Pictures\MfxZAmk3Fx6gtLVhCpruWTe4.exe"C:\Users\Admin\Pictures\MfxZAmk3Fx6gtLVhCpruWTe4.exe"7⤵PID:3952
-
-
C:\Users\Admin\Pictures\CTltmOHiFlSDVhYkh6XwX2Gr.exe"C:\Users\Admin\Pictures\CTltmOHiFlSDVhYkh6XwX2Gr.exe"7⤵PID:3444
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"6⤵PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe"5⤵PID:4876
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:1532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:4224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe"5⤵PID:3424
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:1028
-
C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"7⤵PID:2432
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"7⤵PID:2864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 3646⤵
- Program crash
PID:2248
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵PID:1600
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵PID:4816
-
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:3468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\230210488309_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
PID:1248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe"C:\Users\Admin\AppData\Local\Temp\1000081001\install.exe"5⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installg.bat" "6⤵PID:748
-
C:\Windows\SysWOW64\sc.exeSc stop GameServerClient7⤵
- Launches sc.exe
PID:4488
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameServerClient confirm7⤵PID:3836
-
-
C:\Windows\SysWOW64\sc.exeSc delete GameSyncLink7⤵
- Launches sc.exe
PID:248
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameSyncLink confirm7⤵PID:4196
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install GameSyncLink "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"7⤵PID:4800
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start GameSyncLink7⤵PID:1904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"5⤵PID:1488
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe" /F6⤵
- Creates scheduled task(s)
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\1000244001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000244001\ISetup8.exe"6⤵PID:3836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\7086ebf7c5.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\7086ebf7c5.exe"3⤵PID:4080
-
-
C:\Users\Admin\1000021002\5195173a17.exe"C:\Users\Admin\1000021002\5195173a17.exe"3⤵PID:2820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵PID:2496
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffad495ab58,0x7ffad495ab68,0x7ffad495ab785⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:25⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:85⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:85⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:15⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:15⤵PID:356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4192 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:15⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:85⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:85⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3368 --field-trial-handle=1828,i,4382803057602350276,8093224821226421910,131072 /prefetch:85⤵PID:1044
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 664 -ip 6641⤵PID:812
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3424 -ip 34241⤵PID:2604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4124
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵PID:3608
-
C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"2⤵PID:2004
-
C:\Windows\Temp\434962.exe"C:\Windows\Temp\434962.exe" --list-devices3⤵PID:1552
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5d9ec6f3a3b2ac7cd5eef07bd86e3efbc
SHA1e1908caab6f938404af85a7df0f80f877a4d9ee6
SHA256472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c
SHA5121b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4
-
Filesize
2.5MB
MD5e6943a08bb91fc3086394c7314be367d
SHA1451d2e171f906fa6c43f8b901cd41b0283d1fa40
SHA256aafdcfe5386452f4924cfcc23f2cf7eccf3f868947ad7291a77b2eca2af0c873
SHA512505d3c76988882602f06398e747c4e496ecad9df1b7959069b87c8111c4d9118484f4d6baef5f671466a184c8caec362d635da210fa0987ccb746cbeea218d2a
-
Filesize
284B
MD55dee3cbf941c5dbe36b54690b2a3c240
SHA182b9f1ad3ca523f3794e052f7e67ecdcd1ae87e1
SHA25698370b86626b8fd7a7cac96693348045b081326c49e2421113f49a5ea3588edb
SHA5129ee431d485e2f09268a22b287b0960859d2f22db8c7e61309a042999c436b3de74f5d75837b739e01122a796ad65bc6468d009ec6ddf4962f4ff288155410556
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD53e1e8897f2fd85aafa215bf36561944a
SHA137732fa74f7a39fc0d03dce844ab806dda3b9195
SHA256e5dbef883930798f70f9d1b8cbed599a301724f6c62086092dd59f2f48dbe34d
SHA512dc4d0f239c0f54a00b6d2f6ca73aca6de14521bae55269545feca81a395bff741888ba1182674b0cf536a50b6221e7108d7d7829d9a2aa4a53d7249601f5e008
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1.8MB
MD57d17b6c40628ea74591c3b1a3a468806
SHA1a5671ae2e1d9ae1f3cea8d52dfa90c5060dd639c
SHA256c25cb7b99533d7170c773be852a88ea3d3dcb306378f72af0daaaf84f471082e
SHA512c595c005d5bf6e6bc0dfba01b776ee3412f4f4f82bfcf15cc80078edb7bf2a7551f8db183421418c9a47ab2090978e9c6ad801055705d6514e497488b8e96309
-
Filesize
2.2MB
MD53bca5c5732faeec94a38ca8f550d8a25
SHA1f84de9e34bf26781efb68e2249966f0ab5604e80
SHA2567cc1be20408e621860f06a28035de26c5b240f920ee23ce6867493e9045d4568
SHA512e06356c099cd39768ea554b11fce449b63f7c9297f0882b9fe7ee0aea076cc593127f75b37ec1b6166855f7f170b82f0cd1eeed9f6d80fca94fdcb05fa52f039
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5317465164f61fe462864a65b732ccc13
SHA15b78c41ad423766e9aadae91f902d14a922c8666
SHA25695674cb006bfca36cd0e0f9b80ef0ed240c64f2ee955d9dd4af8102a0c4d9806
SHA5129bc4846a92b7b25e973b42c2cd4895dd15132d0fa1d9ee62e8d7e3679e8bb3b75ae9fb5c6fa165af0f77eaf3e3f75a4d7f60057a0cb22693fc80d89390d09046
-
Filesize
521KB
MD5c1d583657c7fe7973f820983fd1abb81
SHA14cfada887af87f32224fca86ed32edcac00edbec
SHA256df65905b3f10c47b81ab22ebe370bab5db1a38d511338e6e8cc1ff7294a61744
SHA5122dc55bbf18ca62a8e5834d7341a646d3ea082eca7e28ad9c75f72e5813ea46cf10ab9fa98d7ab2f2830633f438aa19f2eb4af768dee4b7a130f8eec17936dd88
-
Filesize
564KB
MD5f15a9cfa3726845017a7f91abe0a14f7
SHA15540ae40231fe4bf97e59540033b679dda22f134
SHA2562dec75328413d4c278c119db42920fb183a88a5398d56ecc80c8cc74fba13071
SHA5121c2af9608736ad6a02d093f769fe5ec5a06cb395a639e021d4ee3f6c46cebc8c101e7db1064984f801ad3bee65d81b95fe6e2e60c0ec949bb172ba9c455b9869
-
Filesize
2.7MB
MD531841361be1f3dc6c2ce7756b490bf0f
SHA1ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA51253d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019
-
Filesize
3.8MB
MD5cb63100cb02661cb2cfc6f69f6fb1a82
SHA1ab9365d41494a5064fdb4b9d0c9f7c3e85cd7cb2
SHA256604956bc7e27546a72f376a8a074d486ce1bb4aa6cfd5dc8ea9b29a92632a100
SHA51201200f7c57e210a74ee436dd084f2635f50c779e0ea87dabaf28afd4d2c7954f3a18e51679b291cfae7a82a6f979ebdb5a398e5b0da97614b7db60c74396bf1f
-
Filesize
3.8MB
MD5e9e5bdd1bc37a6ce727d001ca1facc85
SHA1eadf7a38928888d84e3f330443374535c8d1abb3
SHA256d5aabbf17af1ad44c70dacfac88e507f108425d9a6aed6ed48f819e58424e29d
SHA5124b81edbd5572e30407afc2ad2e50f789e3547eba62b12d22313441ee851c6fcc7e059b671a0ca0ffdf7fed0efa8b4e0ab5ea762ed41094681fa5bc8a774c4b8a
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
1.8MB
MD56129e62103a91193f06c705f05b1ef68
SHA1d1ea2a4ad8496a30bf51f8aa0611afd8480eb7c8
SHA25631b22e4749a83b1397e32c38bac0d7b98032d40d4542cde35392e7b365c82246
SHA51256dc1e0d5851bcadbc0a0cffcaefda5b3d64c7cdb88bcce3f00c476888e17e913ed1610d2b0e5aba0c275035b1ff0838b09f078b79b4229af9dc1f74bc5313da
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
304KB
MD50c582da789c91878ab2f1b12d7461496
SHA1238bd2408f484dd13113889792d6e46d6b41c5ba
SHA256a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67
SHA512a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a
-
Filesize
750KB
MD520ae0bb07ba77cb3748aa63b6eb51afb
SHA187c468dc8f3d90a63833d36e4c900fa88d505c6d
SHA256daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d
SHA512db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2
-
Filesize
2KB
MD5f94ea81b80e9c89d449b6625b6481c7a
SHA176a54d73c01d73b4cb7a835dfa05f52557709fc4
SHA2564259b5300f86c9a7431e3a3afdc51a9810a975eb5d28df5d64a8ea6f6bad0a9e
SHA512d18437bcc2b86828461f3f66cd178106b10f4741ca1606ad6ddd2e204b80387b923b7bf691f0f56457dcc0c52282a9792ecbdc0a29f9acabbf3c7172d3d00506
-
Filesize
4.1MB
MD58f230bab7f6f6d8367a756f2ea792e8f
SHA18ae421af1acdad1e396dd7924a1d3562089b0c9a
SHA256e9177be413e16b70dc8e40718167398931bcafda84a19ea8cf232488206ee3a5
SHA51226023e887b798008ba4cfd0a869cab24a1092ff3f326334ff04f6ced04d84714fcd1a8b98c8315d7736475ef9c13ba6ec34c04f17ae07d9a73fe7b55866c70dc
-
Filesize
2.8MB
MD52f32d2509d5f08a63af9b10707987b7d
SHA1dbaf22cc4f86d19e01c5e1245b1f021e7ee599e9
SHA2560e0cbbd7d7394c9691900c613f18169b0c78cac9cb9248d07be7dbe122a17a0c
SHA51265a1c2299544e7d3a11e2237ad25b6f01647fa8ee58ee749886a5c342f2e20992095ec54ac74b7d0997e43af7866c5480ebb1b7a8ed63476d6c0adf63b22620d
-
Filesize
403KB
MD5051afec86eae8b0ba56145dde9fa5179
SHA152c75be59942e10156e4f0d6c58221fbd46288a6
SHA2568f87b01c08da6c2cfaac6ac981a1d12542bf35a812badaa7ba224954f8de0d53
SHA51288c8407ef6d56e6b0330fc20f953fe6bf4e6e5ed9431b1c6062a0e363415115e96b59027c743f28e2da47864bdcc9dd3ad32f11013b9f64e667488748188fca0
-
Filesize
4.1MB
MD566074c2006444b9ee6aadb114828e3db
SHA112ea1cb91ddf7132e495fa05872c56bba2a0f2ea
SHA2569c6cdc93b1ea1ca06f750d4523a774c24bec32e3cadd56a6c3026f8ce7020a08
SHA51202635c1cf69bf8a401ae72d1850bee81eb2023f6179d1acedc9f5b06c7a64ca64f62a45c43e54e93d38a4f9fcdd2530c36a1cbdcd2b0b54bbfeb36ff1bbaaa11
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
2KB
MD5fdc1fe71cbd265a6de2fc295744206ce
SHA10e2b36738af978a24e72c4e26bca818dd4197394
SHA256d6832062e6c0c8310bc6c85b42e49e6ccb6130c175767ad447c7111d4e18bff7
SHA51222d4ab52a0136a8ed868452ef0adaed012a6eb0e6717bcac1af7361520b4ee675ecf1d4ddfb4f513ecad4682c087d57a2b608b4e2b784f1fedb388b9b2fa902f
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005