Analysis
-
max time kernel
1853s -
max time network
1839s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
freedom.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
freedom.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
freedom_injector.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
freedom_injector.exe
Resource
win10v2004-20240508-en
General
-
Target
freedom.dll
-
Size
740KB
-
MD5
f643e6ddd7afeed1c03ca69a8e71b66a
-
SHA1
a2c6655ead23c3c4dea9171c5aff4adfeb15ea47
-
SHA256
5733dc037491e1fbbd639131ee462afb69a8fe10680e72a240eed268878bdac4
-
SHA512
ad599fbeac0fdbd86ab6e2395c3d82a589e66bdfbef24870122580da4aaf534d610425da8cc82181b326b0fcb65972957c2e74430f6f950c1bc3cdc0da93671f
-
SSDEEP
12288:ab+Azqyc+GYIvPc/90guuCPzhDAQuoBmbW65dH580JAy0J7IRdwhS4O04htM1D5:ab5Wyc+GYmc0guuEtMQxmbW0dH580xY/
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 59 camo.githubusercontent.com 63 camo.githubusercontent.com 64 camo.githubusercontent.com 297 camo.githubusercontent.com 298 camo.githubusercontent.com -
Program crash 1 IoCs
pid pid_target Process procid_target 1828 3028 WerFault.exe 28 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3000 wrote to memory of 3028 3000 rundll32.exe 28 PID 3028 wrote to memory of 1828 3028 rundll32.exe 29 PID 3028 wrote to memory of 1828 3028 rundll32.exe 29 PID 3028 wrote to memory of 1828 3028 rundll32.exe 29 PID 3028 wrote to memory of 1828 3028 rundll32.exe 29 PID 3032 wrote to memory of 2336 3032 chrome.exe 31 PID 3032 wrote to memory of 2336 3032 chrome.exe 31 PID 3032 wrote to memory of 2336 3032 chrome.exe 31 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2752 3032 chrome.exe 33 PID 3032 wrote to memory of 2476 3032 chrome.exe 34 PID 3032 wrote to memory of 2476 3032 chrome.exe 34 PID 3032 wrote to memory of 2476 3032 chrome.exe 34 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35 PID 3032 wrote to memory of 2404 3032 chrome.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\freedom.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\freedom.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 3043⤵
- Program crash
PID:1828
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d99758,0x7fef6d99768,0x7fef6d997782⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1216 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:22⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1680 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1436 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:22⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1328 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3604 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3624 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3480 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3828 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3836 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2684 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3596 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=740 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2660 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2688 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2316 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1184 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3672 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2908 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3516 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=1816 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=1788 --field-trial-handle=1404,i,112654220149912515,6023999287125503428,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1381cab493387c1988c37d65a41ff1
SHA161a89a1c80d11906905e25d49d64ffed1998082d
SHA2564d3203d136d63db8031f38df54946c6f5bd35026b88ad2ef43983c1d7820cd2c
SHA5125ad52052460d1d91b781dae3abbcc091f3816271b92d1748f06c658cd07f17461a79d17e1494d88375612a2242f3bd3d55837d1dfdd632d6e753f21d4f635a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b245ca1ccc34238b5231f11012eeede
SHA124025b4dd8db9f5a98987c900b795aedf051670e
SHA25623d7e82b77145c73c2ca7ce8ebeb5b70c587a97b4fc5adeb19cc207c7a872b7d
SHA512d2ef72acd81ee8ba59a496d3d86533c067f63b79805a9a980cc7194d4d49322ba12e2b93b4b8c533472b7cd46e71a53459de4e48f67f813dc23e7296fb147c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfabd5f6cacc5c2c31124fc3ff19e6d
SHA1e5b59902c3af1796998339fa7464cf64611a5e58
SHA2561286c64316e92ae1ef731a0674ea7dde18df38af1e98833d0ccbbf3d2526ef91
SHA5121b225f7d1d67897059e2b3b4f2ab9facc038e250cf12c937fc463ced4e7c92dee0c30cf736b00b254c1149d6d1f7bd1137f00823a2205ce5141a3649688a8718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ce2d8c8ec6039f5894e62931a9b1d1
SHA11886e2056160323ba5c69c02bfbeecc3eb313c0a
SHA256c17d8900843eac7e297cf6c2823adab19c25f88d8383177f60cc552742cab0bb
SHA51215ed1be862a47823848df34dd6fbdec46506475f76dc220a0d0427eece2355f132831fda5a8cff7b56d7f003513c60d3abf48269420124ac55d5d08fb9019f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ad61d2ec870127c3b3a64ac3d3b950
SHA1279644de3454a62015938e5efb57b36ebc9a73e5
SHA2565a759410d03e7934615b2d665487f5246ab4fc8334167a54c1407dddf7582211
SHA51221641875b29673f0ba456bb9dc64e1f4410dbe6ae14ce4ce150a5ffc28cd0ede37513d573caff422e0f5033521f66d2f87b3401f10d59181056cef7002c76961
-
Filesize
285KB
MD56448babb226a302b4679a50e0a19f219
SHA18a55d2356430d48bb5eb85d097bd6e0f487eacfe
SHA256acbb6409710183945b1b2b2119a4809fee46e3b26d4d2a799f30b294a300132d
SHA512798adf774dda035b8552193c2a1bbfe0d4cd258fcb617b5717f0f914941f4271b71ce8950d66fab77b0273c5e0ab6d3d1f6528f1d716d220f4d16b796537affc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\78ce7f56-5f68-407e-83e9-97e9e0b9b2ea.tmp
Filesize6KB
MD5eaa848d571e057f7c650fad83a6b8cdc
SHA100a1c04a71e6834699665416fe7ed90f05975560
SHA2567f6d21c26bc5a0ce7200d14fef082d8443bd767c56189eb90ccf634ace78c41f
SHA512346f0aec731b82e0781952668d2b3dde1cd154453fddde3b3acdb42cfd8d985c293e410e5b6b2aa12e0d401ec6629c41c160b1caec7d94395ea33cb6839e2468
-
Filesize
576B
MD5905896b59185d3b87a24402de04fad79
SHA1faca0be0bc30ad1b0d56594ddb523d2bb8aa9694
SHA2560fbb1f6166a4508646a777b8310d8af699249b6346b9aa045890f842da79ed46
SHA512976a34900cb38db3c78d5289aa1ca61344f092e02a6e11b3b97a553e1821114f9cc5a9e4c7b03e04808567d562b898ade9cea9dcc4ffd112e586751ff101c419
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf78a61f.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD5c41b1eb1be68bca4f1b41f583b9489a3
SHA14f550675f382f42ccc8e7b7cfae277968b6ddac8
SHA25697e8d8eab6f847e2caa05da193aaccdebe39b3d9defa857933afcafb25b90195
SHA512ee27899e373f45f28d6dca10431f66d76793a68bffc0bcb396e7ae75b4049a111dab0713cf84bedfc187df2b17a752bb2dd6ecb6185c60205aba9af501644e4a
-
Filesize
3KB
MD5c92c7eb7e4f617a1befaadb2b369a083
SHA19a90b3afdca0b9a6c0571a77b276086a85b746fe
SHA2566e906cf98ff7fadf1b32aeee18cb9b1255e8354a779fb5c6710674a6e1c1a166
SHA512606ec34698eeb8bda1f94c87ac944d1e00f1eb63abc99d0edd52b55405f8a70c63bd4398d6c181f6c246bf700cb8b6d5712591adc1c8ad081b1bb001140ec044
-
Filesize
1KB
MD5dd447d2326d38335350b71c8149b2512
SHA1471e7a0500194130c954819573c43cce8c2a62fe
SHA256822468271ac46877b48e99581987299f9e3ad9c6c5320f2b7e66d983c646da62
SHA512302aab5e8bbfa2be6479c73f9458c0b4b76afd851b341e9a3f9eae82b66363f0d2655d0308e8a46495d5af23416f66bbfdb255cc52f48141987558ff5b60fa20
-
Filesize
2KB
MD5839e3a2ea807aa0ebdb8a5b75ae722b6
SHA10b02e547b236eb12cc914374cb9f79e85f70e0e5
SHA256fd3d8c69e9bdb02cf12f4af9d438cc84cfb0a3b4b77859c86a358711b490061a
SHA5129c895cf5e765e87dd2ba0da730b25b348e579a98c5fdf96d98157401b4c03e02e4239fdd21e231c9f138bef73f683174e90fbed5877ea48a51ce2c53effb95c5
-
Filesize
3KB
MD534f3e888e87a907988abcb8a26cc9056
SHA19cdecfcc12dca36f881507666774dc14e7521e6a
SHA256a1dadc5fa3186530cc94c0ec0307fed962139bdc21c7008d8e60de748c1682e5
SHA5127a8018caf08a09f4d6cc8a27a6bd5ca67521b22afb45bbf67e4c010edb5590cedfb0229987e520765d431853cbf2824e48ceb3ae915ccbfc3a924d5965b5d890
-
Filesize
3KB
MD5fb7d13fa6d790998ce6a444f9426e246
SHA1594484c209e94e5f70e6d9e54098d2c59b797469
SHA256b5ed34e03b9c70534e2ec75141f793a73adf5d5771c9d77084c626025a87b9d5
SHA5121f99c9209a770fb9d2197adbaf9a2a3938e7545865d3b470a973feee34a33a27b44b532091123ec420aa4801b8ac92dd24433aa59fe68cd7af651e24e5d3e5ea
-
Filesize
680B
MD5b6c203928cb771ef1ba1560d4b901b64
SHA1948914c999e5ec6e18a83bc3c197d96fd77a67c0
SHA256174ce1bd2c5082d6fe42b92538ab614aa363f66c91671e0063532d8bb1a15dca
SHA512642d498136cc26a66915a32b7087e091d7178805fb3b7fcf073bae7a42a38da729c671964ff40a7686cda08f124217fdd1b4c76f55487a78508d39b3c84c3c0e
-
Filesize
363B
MD5e6ab639847c41e10594e84dfc26a98d1
SHA1316e1be90aef90863fd65ef4cd21db2fe6ad569b
SHA256c2360c60e56c9f1433245e06ccda260c07826b3783e6743452bdcbd6771600ad
SHA5128ed4898b163157f3a17a9d3616c04867c07d56398ac6c2a850c6db8bba4eab55d1a4e03558128085244f167a5fdcaf7e9947b85e360b1e10a9a104be4b1901b3
-
Filesize
682B
MD51c29f6b61b57b30354f345c4227202b7
SHA1064799573458aae6824ad2a3979fd0ce2c9d4ef9
SHA25665339febb3237eea5da04fa87b27352f67efaf6ecbcbd847c5e3786e2d362e94
SHA512d983fff76aa51c3e6dcdd39b4e1a2d4ac9b1033440b8790408f016ba0d527b25e9709b96eecde1e0f283ebdc8b6f9e33ef81f507ff331c29092cd4a15b988b6c
-
Filesize
682B
MD534b88ec560f08b7064a8f72b1bf87a13
SHA12e19e0df7ad343f06c5918e06092ed9d85875d81
SHA25680f2fcb73a3f070586309a2ca2b0dcbbd6a3e78aa6379e0420849849f44c48c5
SHA5126a9ff0719e43aefb7d3fc393f0e693b8815a8435ae07c447b066551372cb289cbfd69bc21611b29fc5a079dc7bfa4aa4fd610eed87854430e7fb6831c7b33d95
-
Filesize
682B
MD50d80dbb729a0499562aa11cd0e651cb6
SHA16f537935dda4f986822101e39bcb0e0e144b3d8b
SHA256d87b260552bfce7b70875ffe8472ff9bdc9fd4a35d5f4a31da7f9ae97971af59
SHA512a5bed5df3e6bed4f51ba5ebfb639590a31e9ca17e3ed54ccd5c6080f0bc2067f167d7f49db9e0d51e5034a73cc8654e3bd77704a2653139ec57b17d3ec84df89
-
Filesize
5KB
MD517d3c89e8a9b447bd857a197db1add80
SHA16fbd6a083516ceea7ed2388d12ba6d5cccb7b897
SHA2566a1593c2c2413da70d36fdc0348c03817ff5e1708464345c4d901828d410e66a
SHA512c6aa4cb6cd0b639c392aabcffa3b75d4eb04b2ef3f74a5e295cb650dd2e73c5fc4a1b0a22af858e9661862a7b04cabf2c18343238777a285fbad9c74724cb2ef
-
Filesize
6KB
MD545f25d0da0159a6a71723789259075d4
SHA1e6a7097992e9de82e28f110082c1a46ac7f25d47
SHA2563c04d54c5a40e7a71db38675d786f7c65042e535439a8e5d3a18fc206d9794b9
SHA51211e953f83a39d99cb7fdd783916b719ace1f80b2bb8b32096fffcfd82ea9f8a1acd02466ca6c4c3686fe483091e97663abe78eb01d798979932413d349c9d8f6
-
Filesize
5KB
MD54adc67d587c26985a9f213b101665a43
SHA191d0ab0e1fb224bb5aafda058d4ce457bb56a804
SHA256e8b21e29696467b76cff439087ef273ccacf2dd05d972efb5c9b6d8ec159ac20
SHA512d27025825fe8dcf6ea1eea0bf9813225e5ea9e8fd98bec3710d18bb69945e2bca73332690c32d597db6f56c212349b4d6ce6560d36cfeba8ab04fb6e49238118
-
Filesize
6KB
MD5753ac6f523e3a35d198d64a99895c08b
SHA199eb1975d092a177ed0dc5bd76920ea8611b14fe
SHA256de661b28a173a6187ffcd27eea7de903d6ceef487a94db5ff95cde83d0a78247
SHA51230504b37e144dcf666ed63b06f34c360c32b66ee212c7cedba7239ccc415ec6222e4634c97dff938d52d56d9f6374eddce5a8513c56370e59a44938d9cd58d06
-
Filesize
5KB
MD568a693140b5a5092f5d01f10f53ab795
SHA11e9ca8172ada7b132a26ba43f0b90e55bb5f83c9
SHA25643c88698ff65e34aea0db91bde140b6c06b116a55358a78a32f83e08822830e3
SHA5123804b0f4da7779cea8a91e131c2a4eb1f90e15006e10dd2ae6da507073be8b8a0223dcc596dccbe012c486aa708fe41da57c1c1136d5f20e89fd70736a84a08d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD56cf782740ce1c08ad85a029529baa197
SHA197da36a99d98833d566998bf5a533564965478f9
SHA256628abf209a250a0a65052cb5cd4abd4bf7aeec676f3eed64bddab92aaf5b5699
SHA51208902a7765af556856ff66ae826281dabed138c157f22ef53116f747f363859166109ccc6e68844f37d17319adb062bcb787d101ce9759007d43e023e22a00ac
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
312KB
MD5f66bb9911f718e7b8cb8db74af0da613
SHA1707a5df77bd202a1003293f722119512f8cd0eb7
SHA256bbb76ff3fa046088405531f65a6afb9fadea06a31e91a4e382e473df93855cc4
SHA512c32ff926f0d371e57bc2cbf5ed9d8d34cbcd74d5bf082b837d9edba2b862006a59c1a39aa56879da4e893ca3227554d49aadaa688a8504dde1b43c3f20f6d7fc
-
Filesize
284KB
MD5ae11ca7c0cc5a6f79e37be3594182234
SHA19af3b5c4c99448834422f91294ff068806d20016
SHA25674ef8fa1e36d32353d94fe320b5ee18a2f953997f64e17c6c31bcde6256e4ac4
SHA512e2e8b6aacbe303329743c54e45575fd9b4b2d906592bb134bb2fe594e46baa3e972bc6f14fc5084704c04e8ac130421b65983e33fdf8e8c444e018908bc5190a
-
Filesize
284KB
MD57d4f68205f48af94cd5ef84557b8de82
SHA1b9e48ea52c13e24127e3445a5d886e7c6db9ba10
SHA256933205043ca7b4488712e41ced327a6f316a777f2389afb3d64b68cdf79fcbde
SHA51211f3214087ab4e3203b120f627e03c0e2f78406fe02992a2e8745fa17bb00c5138597ac309da478f47e405003dbe22d151cbf18154fcd597b2c5ecf9cdf0af0f
-
Filesize
140KB
MD57b104abc990a8e03f7bd9d192ab8aa86
SHA1c797fd31f10b817f036247b1b1b393ced01676f6
SHA2567b5390c1699a850007a4b6a51b61cdae6de356bea9c18c6e42873029fe013c94
SHA5126f24b58d2ae4fa333116e3f2ebcb3805e035a43f4b78839d7c689477849ceb69dfbf0ea932d688a7e5b68f07a0663f0f3cf882c34e04464cadf84844f9faf8db
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b