Analysis
-
max time kernel
486s -
max time network
1051s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
run.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
run.bat
Resource
win10v2004-20240508-en
General
-
Target
run.bat
-
Size
37B
-
MD5
fb0f3e8f45fdd2b9ddad038f59f2c4c2
-
SHA1
8f4552ad25126e88d28dc65fa49a91ba389fc229
-
SHA256
549304f2b20cf1cca4238be797fe738a1ab2992c65a22af6a03313790230c9d5
-
SHA512
594fdc8e605c71c092c80ca8eefa50c750fa05e75b6dba0b9dc97ac618d432845acdf1e88b989d096c243ace38f6fb5e66139965fdf83dc7e9286f106ad9c9a7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3060 2080 chrome.exe 30 PID 2080 wrote to memory of 3060 2080 chrome.exe 30 PID 2080 wrote to memory of 3060 2080 chrome.exe 30 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2736 2080 chrome.exe 32 PID 2080 wrote to memory of 2488 2080 chrome.exe 33 PID 2080 wrote to memory of 2488 2080 chrome.exe 33 PID 2080 wrote to memory of 2488 2080 chrome.exe 33 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34 PID 2080 wrote to memory of 2596 2080 chrome.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\run.bat"1⤵PID:1260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d59758,0x7fef6d59768,0x7fef6d597782⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1004 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:22⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1568 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2332 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2360 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1004 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:22⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2892 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:22⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3240 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3608 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2828 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3484 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1544 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1852 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2432 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3796 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1180 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2124 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3448 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3792 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:12⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 --field-trial-handle=1208,i,12943792752583184699,15481048257456791897,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071182ba179c401d530cafb6f9209905
SHA1601ac15d06a298d848b1156ba82ba22405decb79
SHA256a20f6e49874a80b67b4cd6988cb904a45df16f3bfe744dec0e7318dd10e9a1b8
SHA5121ceebcc0e10734070e45026d6d1a1dbfd5e103e19aa149bdd8980f4bdc61d50c4d2ebf593a6c39e2ee6b44c816ca38fc6895a9351c19e270e2ab33d1692b7db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c5cfbed198d2ca35a8ed3cc6c1bc9d
SHA130e8592d9e6bd1e83ac79e0a539533650126060a
SHA256fd4b502c164f1b8c066588f62fd4fdddc9bc61b010dd35c4b87d7f0f0dd46c33
SHA5121acca5a72390aa6d49ba9fd61a663a3d50d22552726fd157cf8a115342a32d44a63da8a5789320216e96e8fa4c7a185587dc74c99aa902e9ff318a3e6965621e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2df1480f436cb53099bf4d7d690d46
SHA18ac7472c3458df24d226293429b41e9080a5a6a2
SHA25618f7d7f9ea6fa0fcfeb6420313ed20d8be5d416f6327a44f0b541504ca9d5d5c
SHA51290bfc828769fb15e5eb588e251191c0037828cf7fb5ca9dba531440e9e020f5d3d5b831f572d6b089e087049db7359e8a08db6ededcf1a88a0b7b4e99d413e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56192cb4e93e5f6c11e51ef7127eb89f4
SHA1ad76b1b67e21b209316e5e944bbe674a34610327
SHA256b4ed021c2aa34b93be2bd8c365e3c3e3d3bb8cffd1fbe74dd38ea2e6ab7539b3
SHA512c8c2ac76b285ca1eac1af9e13704029b053c22573e541c611752266c3fdbd209501d0ebf454aa775dadc6a339d62094984688fb0d4619248099c9285a5acfcba
-
Filesize
69KB
MD5c356a0c771a0209d3482777edfc10768
SHA11ff2d992af8a6f19c30ecbe8f3591f26fe1cab08
SHA25632381f4549d36fa4583e599adc04056a4da80a6067c6805b7081c3f3f54a27ad
SHA512561084baf8d65579ead79e79c2c3920ef987384d52ecc11a2689aff95c54a6b823a0c4a8e5b910e60e569450e36563f53adb5796f261f13bbeea59130b81fe3c
-
Filesize
327KB
MD554a1ee0201cf72200a17257da0be1d41
SHA11da287d2e01977909ec3e478a739e4573630f321
SHA2565afdd3cb962a46bd9bdb52b68a54888e0b96a4c55cec36173ee896d4af847340
SHA512e83b3fea2ca8ada7f0b17261043a9b5a4b75f2cc9f4d5f4778266880051caeaa4d7b95c84e4dc6657c19aef5431e0eb0378f2acf8f7040ef2e8f61683bfedf4c
-
Filesize
133KB
MD59c773542deae67aa7e9f064222773136
SHA1475649ac077d98b0f529cf2003f0a4f7c8a8b014
SHA2567e77f66d8f9028d3c68ba1511ebf688a3a1359df9366b713ac1d930fbc0e4321
SHA5124161f9e41810d66e16a002d6eb2269dbb3380a90553cb4d1d339642b97f27fc6f880ef329a6793a32e2e27a09942a0160ed53ca4f8408f972de750eaba78e4f0
-
Filesize
252KB
MD583028ad35082591ecf21a7de6e062d1d
SHA1cbcf65eeb9328c73f0d3049ac6ed86c0c2665d2f
SHA256c137172d89cbdae6890b68a27a5fd415763b2612618fb2a6c734258d2be2e3a6
SHA51257a70f1dbc4cc0292a62e8126af01d2c500ffe8969e4ee253d7410b01b5201e7db72b0c3bcc646d909f5e91ff2811644e591b7f646d4320306e48c70c4ed55a0
-
Filesize
164KB
MD54d556c2cc10f8727638e49463b7d2a89
SHA1257179478e9f824988c329ac72563c9aaf7bf60b
SHA256ca0f78aad838f0e3fed01621284f941df080cf134c14768f9ae104fc47c996fb
SHA5123146f1d3b6a0bd3ced1231d313d23591ad14a680b08f75403c79a22c52632ebd279fb05a11918b060b860751633eada4715d13b066fdf6867222f2506ad10a65
-
Filesize
42KB
MD58f1f73a6bbe39bdf9491f7672b28db4a
SHA117e1b5e01c6ec0fe14e5091c4bcfebc17c0c0f79
SHA256fc0f0e634256ad4acba4e91d7dbe8f18d90b5daa7c5868a5e2115cd45e41c92b
SHA512ea228c4f2126a188005608488b2d980d36984a06999d8fa5a00ffdf14073e4a00d417518fb1716f664394613bbf1ea70b74ad6d12335d1afaddfab51d42538f9
-
Filesize
223KB
MD5a06dcd12ab1eab766d22c22b772435e1
SHA1de36891470ceaa364c65e9e31998aa1f1a0d4b03
SHA256eccc0756122ada1ed0f4f7df11d6445e980c44de3e6cd961271c821a669623ee
SHA5123998d3656f3e4e68a0507b51a6aab8251602dbd439839729eadc55e352c35ad81c1da0bd8cafd82dcf74ede5d7daaee47e1f37dcc6f6b308f5d1e355850f7b29
-
Filesize
432B
MD5f6a564464caa02502c3bedb6244f9924
SHA1db7168dd0889100f0206665688183235c8ec002d
SHA2563c28a293c1d28c6cc323b41551018d37c4c1bda34bf5b8a0c8239641d15f0923
SHA51233403f9edd422e053594ed8ebd622056dbd256d6e30e3938ee94949c6ab3b116ae79d703104f7c137692567d32880336bf67d0f0353e60da907235503b017f11
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf77958b.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\61397e3d-c38d-4093-82aa-6799dfb1758d.tmp
Filesize4KB
MD59c0eeb396895e17a5cc28655e57c77e6
SHA1126af6d18c23fe460f6fb0308b1d016e958b37cb
SHA256a086455b06395b8a072e9656fb6f31e1da57010e2dd00fa6d0b0c8038c06b842
SHA512ac3658c3f87c98ed2a7900793f6bbed057b645d4da82d4aebc6e678327c278dbcdec86ad06927fc7547cc3cd845480e222178f5783e94eb62abb26fc2acb5d20
-
Filesize
4KB
MD5819af371542b5f1ba4fb30dba6c4b43d
SHA1305dabe06dcbbd22e91924c182861df569fce522
SHA2561a73f8ce341967561ff904398f27f5ecf11a26770bfa6a3fda647e8c49695ead
SHA512b1b1173c6f7e779aba8d23b259ffc0978fba400b28932a5970bc5842f84cafa14aea5dbf5976bb32507ea95eb92abae114e90358dbe2263687655cc101ff576a
-
Filesize
3KB
MD5b92ff45bd52c05e982c36a6062e2c3e0
SHA1e3f4a6b0af29b8ecea13aadc00e2c750e4815dc3
SHA25699c6c40c95607f53b61f92f2e881e0e247ade97c153dd77b976ea7c28399de28
SHA5129ef4b3b4c4f701f9e259ec4b4ee4213226c393a2270bf0eacd73923c4a0f46ecc91fc08775ead6f7bf50c011da3e9478f442e4833a4b6b5787b2f06280f78857
-
Filesize
1KB
MD54ad4ee9df6dedd4b8a5c962540bfd681
SHA1271c179e1d683f2984a81ce5d01d2dd7e3e7988c
SHA25646a645cda2a5b474d21b201238736de8705f16c1f82beab1a99cbd7268bc31f2
SHA512f2f22286082287a675d24b348b14eab1f1eed70d0a2cfa9c1faad11d2ad4b2681c38814542a58ca8b21fa1912097f6b720d2b7b9ec6cfcdefe532a93636cb614
-
Filesize
4KB
MD51551e5a094250a37a2ab62b1d0cd785b
SHA1544d2de52a3022f9b39828a60e26840506dc42b5
SHA2560a8a30f07bfd4b186dc334b4a7d161812a0e09fc14d1aaa09452338f0c5b8cb3
SHA512e397665bb7b038a2fa21b8398b2c0d29fa435cba56bea75b3409890229a0cafa5277530c898346827ddb3e6baffd043da6d4921ba9ef18a32def31ed32ddd352
-
Filesize
690B
MD5ac1a2734f61d5c7e1e51fa461071d4ba
SHA1948a29b0f74850cfec365a5f3f31030e1b84ce03
SHA2564118869e20e6c2b407f52efcc8639df58f5e691521878044e798c0c2946bcc15
SHA5123793614d6c2f950b4aa957a04f189e945986af50cf96db16c362b4f36e56f70f4f2c2546b1cf0bfda42104a033e8ee620bc7d23b33e7817ff99f8c09f68683e7
-
Filesize
363B
MD5e5d4add1f08f6e2b25deeeb10b0b583b
SHA15f2da9aa673a28f7c2e073da6d2825c5325229a5
SHA256440179cc6741857ffa307c0c088023879589591a3ee9b86f18c3900ef161cb02
SHA5126f27b01d5d3e3eeae1b8feefb75b55912d0c12750f38b37edb4bd57be0f68047f8d9fe9e398375957cbdf7bdda897abcc0d85b236e4490b187ba683cd9905391
-
Filesize
363B
MD51d90c7d2ba3b776327db027d63f79649
SHA1a856430b55711aaa30264c00df6bd88c802e9eaf
SHA25644d6c23d0dbf24a34283aeb91ac975ca0af0693c7ecb7707728ab8463ee09fab
SHA512bbcc8e437c6cf6fb7cbb4102ae3f2ebd7fd13783e8d733e908467df429eb14743c017f01a36785bb14b54996ac9267dd9eb37bc9df6bef44b205e76069d8f6ea
-
Filesize
1018B
MD52b8ba279323b31a584576bd2ca41464d
SHA1630c55afb0d1755cb088bf5ddd033cf7bffe99b3
SHA256be8906c740714a5fb2797029338cbff0a11de32a7ec6be9a23d29713e7ee8f5c
SHA5121f4b8b644a3fa8933239023cf588443dd831ddd76bcf70b0c586c4dffdfef600ac13c038abe1989a6681c6e6cadf1c91c7e01de5077e1d7e31d017c8e5a82eee
-
Filesize
1018B
MD512a1b8147764b7d1ad3ea630769d05c1
SHA128ca2be4238ea9c6717da805d4f2f94b669d179d
SHA2561cabea7aea2a3777d3292eb6e12e02e20fe4a6c63f6dec8293001abf3a4552ae
SHA512d391be5fcddd6b51d3f2088a86fb9807720a91e5d1e99b590283b5904a3f1f7ab8142102ce55541d8722503dc778c9cc61c169f0e08ed12dc3a2d9d96384041e
-
Filesize
526B
MD5d928bac2a46560df40d2251447397288
SHA1a3ce9c0061807e99d3b507e9e16a30dccf40edd1
SHA2561d20f6c45a0756b240950d85ad60536fd9babfd2c60ed703529e592051b93512
SHA512cc2fd0bcb77b49ae855d666e0e37e5b9424bff5066251a545b0d588a23aefab0d7d1740d410648395e1e26a3ea5540e2309b1d0ca47a6b2d3481890f6cd14716
-
Filesize
526B
MD565d2f413defee3f3ebdd21e4b45a54ff
SHA1da3bf5ad65dde8f0a850fd40e94d5fbe54f1f6a2
SHA256c4695a6f13d5683b6d276b049629f7965e735903d7034965e369645dbd372ea0
SHA512ac87bd400531e92f1f410cf82b7651a3588d1e4e268143cd5d8d919e4d98202874f9fb73643422d50e2b5191ac69b8d06dde5c9dbc01335d8f89c445c03863cf
-
Filesize
6KB
MD5e344c0bcc6a3907fe3a36d61753fcafc
SHA154ea5f6417d0bc3822e4c2ba01d4aacff434b42b
SHA2561d035e80d9861f03191395d684e0b095497853c7424e2ecca905da658dfd35f6
SHA5126533182403edb90ec59c83e1c4defd752adb86d551be8b600e86f088575928591a114bc69658b5f25332e89b60bdc729746b4529e26b339d661f6bdcf23b0329
-
Filesize
6KB
MD55de2b4392b83b880b791066353e5e2ed
SHA1da40d80ca9fccb5219f35a81b1fa0f2cad58824d
SHA256746dbe70952ce64005b1623c109e9191e3bc1ee8bd58ca29741f11ab59ff951b
SHA51234ef7ad053c49f0373ee602991b74b7222c2ede6854a0e9d45c0b5d16918fde11a88d5f29d3793be3ed4f315e4bdf96ee135066e4b465f321f11d4a143c256dc
-
Filesize
6KB
MD5f60f46c313da60c877874a8b82370828
SHA1f6efecff7deb4d5b6c265ff64fd06066ef4b1d0b
SHA25671f8ab904a79f6a72d9e253282c8664282b205f003a3adc83f9ae306ea400d85
SHA51254d3c6535831d7d2334c1ae7e7d31f12a5857ec768ec725359551ea4275454ac753c019b00c46b92286ad63e94da208ac91e9cc4418378eeac033a17076d93dc
-
Filesize
5KB
MD519d9f23320abe4905aa836883b1fecd9
SHA13ad472d4bea25171876b2428475b8571a10a3103
SHA2563d664a6c5f8c44ebad7708d1ff52fa2c465ff04d6269ed3f7ecc46a564c4da46
SHA512393088811b30b95b52f079cbcc2cd47988097d63af905d24a5ff6627f199e862c8e25e9185af21abab7484ae449319a56e9978cfffe3a594d11646130f3c8517
-
Filesize
6KB
MD5b9a3e4e781296a14418dcd271936b3d0
SHA1eae2568da3c5de1de9f91bcac2504088de1d145f
SHA25648ba99327ae932d9b0b6196aef14fc316e147895033cb7d15f8ccc1708c185c9
SHA5129eb01e7d5f396c6fb65ec12cc7fb7d37486fa4243cb2b7f4099c5b07dce3c06602fbf5a32460dc5bfa084fbf506b877ba4c22f6637763c2d25ac0cabe6382873
-
Filesize
6KB
MD51f7882802519307227fd275e3b529a69
SHA1f431376e10e3f567a9f393e3a2da14c3d3c8eff5
SHA25613efb85b75463b9410138ac8cac3b478db42989f5cf7e9a42f643b7144a24f61
SHA5129f3331d7b7862540d14d3623fc4ef06e5a8ad6b0a34bdcd00fac4697a4fce9586bb7a52166fdfea74057bc426f9e4d9e46bc6d1cacc6da7fe20d4d3b64239ef2
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
272KB
MD533deb2e35e93684775bc478f95dca993
SHA1c369000f8965e6ed5c1c5f59ba869b4e1dbed5df
SHA2569f3717d7710b8c0373d50eb660af24e38900d69a861a032be1ef30881a907159
SHA5121aa4682866e09914acf212a252dcc44030a9f272212862ea845b1e740ad35686ef6a321aae1b08f93cead1013e6b813f62953bd0eca08911c27da6dd0c504499
-
Filesize
272KB
MD5043837be6726f9833dec6b9029d83414
SHA18a1cf6e77cf15095bdf48fa6c3a81f993a7fe5d5
SHA256cdfc73c5da099c020dbe75c12b4ac686f6fbbda654f7021b3c612c09ca31ad4f
SHA512d66fcb8a05dd7d5ae7b75189c32886da29d44f333c96e6397308c4288618757239d67a763dbe1b91f76fe8fc367826abec6953fa9fe017ad9fd873860f9a8cd7
-
Filesize
272KB
MD54767ae3cfe8c7808c90335a555f3002e
SHA18ab4d1d21c5833216ec6e075c07e2558d78797df
SHA25683f6b09d778b4cfa5dd7a2a69d13b4140ac43224338a895de195271bc6f64076
SHA512fa97cab5e2ae1ef00ba2c2e2f85473e83832908d65d3d6f4207708e1a65c3364ca003f91e2791ce0d68820a15eb1ca38aa6d9919865ef75bf9f0ffc5acebb405
-
Filesize
272KB
MD5bfbf5d126dd8826534abaa8cb64a0b03
SHA1767c7c3275f136429aae15f51da942c325992d47
SHA256d6b34129a4aac13c0f6943c69ac5f690bea6cbe7041c08f001d7d0223868098c
SHA512ad26cd45506c13601056f8c2573d210e558a7f9f2002b1ea221dc0a6440e0bb6ca01b95f0d66ccbf69b4a3ad748ab132dc4cb73d672470e0280e32f513b8b10f
-
Filesize
74KB
MD5abeaedd3b3cac4f2b29a63a0636aa5a2
SHA1cfc48f39779ea01f9a98a319cf3629621dd93aea
SHA256e08dc1ca33931c788b261f242484fb1bcc9b59a8b9f2f5c5395b985c6c4332c1
SHA512ee9bd69fbce5f71203df776a8e11204bec517a72ce2dfefbf774142d746cfbf6fe5ee4ac423cc5725b10e71d678ba520dba2fcea33b8bd44db0825006f90df6a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b