Overview
overview
10Static
static
908.06.2024...y].zip
windows7-x64
108.06.2024...y].zip
windows10-2004-x64
1OPEN ME.rar
windows7-x64
3OPEN ME.rar
windows10-2004-x64
3SolaraX.exe
windows7-x64
10SolaraX.exe
windows10-2004-x64
10dll/VMProt...32.dll
windows7-x64
1dll/VMProt...32.dll
windows10-2004-x64
3dll/VMProt...32.lib
windows7-x64
3dll/VMProt...32.lib
windows10-2004-x64
3dll/autoex...SE.txt
windows7-x64
1dll/autoex...SE.txt
windows10-2004-x64
1dll/celeryuwp.dll
windows7-x64
1dll/celeryuwp.dll
windows10-2004-x64
1dll/celeryuwpver
windows7-x64
1dll/celeryuwpver
windows10-2004-x64
1dll/uwpoff.bin
windows7-x64
3dll/uwpoff.bin
windows10-2004-x64
3dll/uwpoffver
windows7-x64
1dll/uwpoffver
windows10-2004-x64
1dll/uwpversion.txt
windows7-x64
1dll/uwpversion.txt
windows10-2004-x64
1scripts/scripts.dll
windows7-x64
1scripts/scripts.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
221s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 16:57
Behavioral task
behavioral1
Sample
08.06.2024 Updated Ver 3.2 PC [no key].zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08.06.2024 Updated Ver 3.2 PC [no key].zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
OPEN ME.rar
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
OPEN ME.rar
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
SolaraX.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
SolaraX.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
dll/VMProtectSDK32.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
dll/VMProtectSDK32.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
dll/VMProtectSDK32.lib
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
dll/VMProtectSDK32.lib
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
dll/autoexec/HOW_TO_USE.txt
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
dll/autoexec/HOW_TO_USE.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
dll/celeryuwp.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
dll/celeryuwp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
dll/celeryuwpver
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
dll/celeryuwpver
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
dll/uwpoff.bin
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
dll/uwpoff.bin
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
dll/uwpoffver
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
dll/uwpoffver
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
dll/uwpversion.txt
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
dll/uwpversion.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
scripts/scripts.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
scripts/scripts.dll
Resource
win10v2004-20240226-en
General
-
Target
08.06.2024 Updated Ver 3.2 PC [no key].zip
-
Size
9.6MB
-
MD5
c6d1f63c7f1b52ebea21777fe14bd76f
-
SHA1
d24be8079674e99130b3f65022f8f501dd9a1cbb
-
SHA256
529804cf8e209aebaa8561fdca5ddd0d9d834b6c490266293380108298eac7e5
-
SHA512
09662630c251c342fca791cfdeeb8c00d114fe70ee5d3ea724fd814f490cda4ff17e62852c806ebeb7f32f06c0edfe7383e74c6b1e3ce0d36c2f733c1173ea5a
-
SSDEEP
196608:94dxwBHWwKSMT5srIxB/7Mwvv4oawO7Qgs3fX/Wa2acdWLSTvq3:GYBqCr2vvv4oaP7Qgs3fxBuWLSG3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2720 chrome.exe 2720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
Processes:
chrome.exepid process 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2720 wrote to memory of 2620 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2620 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2620 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2800 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2968 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2968 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 2968 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe PID 2720 wrote to memory of 956 2720 chrome.exe chrome.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\08.06.2024 Updated Ver 3.2 PC [no key].zip"1⤵PID:2028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6be9758,0x7fef6be9768,0x7fef6be97782⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:22⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1568 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:22⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1460 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3548 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3672 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3424 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3832 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2032 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1320 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2752 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:12⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 --field-trial-handle=1348,i,15648118222721003330,16455690195677130663,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2188
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Temp1_08.06.2024 Updated Ver 3.2 PC [no key].zip\OPEN ME.rar1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce9f05890c53f2e96908f41d4dc386d
SHA1d76abc97392a7fb1cf29844b2d410c09d791fb97
SHA25651da21fb6e5dd5dfcff2c8af0bfab16379daee93305b4fcd34aef74d60479d7d
SHA5120806957fd6b04ec83ae9c18f30831bd0e4e474a5fdffa303b6df052f9c4b63d1e26a3da9288b2f796fcaed26080fbead357e8d9cfac95a4de109690d87dab637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9320df533d3ac206671c3973e23eae
SHA1674e67162b35f6527e786d1c21700f51d3afa004
SHA256d8774be38730ffac3bd74ae7d0fe9b32acbb4fe0872f6096898a876761f258bc
SHA51277281732750670c694ad8f01f5024df776e5529cc17d84d2e7f41cd62deb7a9bdd10012b476fa5635755ec9f111e778d7f9cc95ba7c7e3e848542083a882cf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efaa7d3afb1313adf3494f861092b911
SHA1757852fe978bc70b088d5e8074c0588f0c6af8f9
SHA256b81fb81d7b2e4d7e520bb61bf6a8ddb227df07c78927bc6f5acbf08dc0fee3df
SHA512deff41ecda422b831838503707f8e78cb9b9315c2bd2671cafd472828c596770e5d703308506fa8b4e829cdc904e5d28e3fc624be4bdcfb118a2df3b1553abf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5aebebf2e12d2687481877d8d1dbace12
SHA1e2c37739b6c42a1ff49b1145a7564e704b962238
SHA2564e58344a3a222302d20d322b23d3148fff6dd2dfea5653960afc6f74be89fbc2
SHA512d4205a5149cfe44e979c0a4e59c69a1ab4530f3da14a830ec26f7a50a538ad499d6057ff16afa3dd1e3967bb63d5eceac692ca26160b1f321e965ca89d3c37c1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7aba69ee-763d-46d6-9b8a-a8e2e19ad34c.tmp
Filesize6KB
MD50583a7c43c9333b4be15ef98cd968404
SHA18c9df4d979b2d753860f80e5a5070e6fc95e2179
SHA2569cd935fc07384b03fde715f432b2f1262c9ece1c2ed66e61d82938c8986ca54c
SHA512f79dadd53375c71f0933e9d47f7666d285569a08088c102609dd123b01a3ee3b40ccf369c42f890730b3b9d8a43e4c3db75271c044f53a7e671ab37e5bf5798b
-
Filesize
216B
MD500f54dfeb1b64ce169b8c724fe561eb6
SHA1d9e7952a11ff0d7631df7f01f0cf04d1f404da0f
SHA2568627c0f785146219486b321ca5f5fad51dd12aec857a3f2f1a0e54af3865ea77
SHA512dfa692a724b56aedad08128bb1aa2ce4bbc3a3b6bdb1fae8f2f938a41cb06e494bf8d8dded547a1749bc055807dccd545b0c06c6dbb4f00428cc1e91c0c8f2bc
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD592e23b51b54d82e865fbfd0347716500
SHA1d19ce35757a2cbc87101925b80896d02d8d4b81e
SHA25694560a41796c1a40d326a93c69dd8c81f0bb81ff01713e3c6c7ec621f6f4e9c5
SHA5124b21a97ac89d5e00a5a15cb1d32679aaf338b916324e16f552ee82936aea11fab515afc05021fab4b6c4d632da8147b9be1195d805a98298ca888a43a2e7991c
-
Filesize
5KB
MD59aeb7a86d5c624213a758e49f0eaa42b
SHA1c0eac39a0bf98024cc2b40c16d7485cf79a899ee
SHA256863577cc47e6d55152d0447d8169d142929434e60a488e03ceda643e2641f126
SHA5125f073ee13e6403d18d986016a8568dfb7c63bb11653fb3e7c8a53737293df1eced70de08dc622300606610bfd6fca109652af4ff27a8c894f0e14326bf462bcb
-
Filesize
5KB
MD5f99399922463abb724d213d206cf8324
SHA12c22a9d848cbd09332a91d26cc09783efa14aa7c
SHA2566bd1129adc3d01da2306370e5835bc818f1da2824be1483bd38924d019a24c03
SHA512fa292c82336342db700e9e41711d8a8174d3d17e3061899fdb37939dcee70fba837bf03e970b2bfc54a015eadc34c8ca3c826ac0d25302dea9667a77df3b5c7e
-
Filesize
5KB
MD517494ae7c037bf61d056dff1f2326f22
SHA176712f14a6823e8f795f050f5008315d0a115606
SHA256e3e1219961f857cea5719582c144b2e19b41cb955b6707a185b841d6d6cbb019
SHA51296d490eaf9772130cc456097b841e9f3de155a0c608e7498703fc2a17bcd0b954b55ab603421eaeff3c5f288a3d7abd6f366357a1aab4586f5c93914ce928d84
-
Filesize
6KB
MD539391e512c08f34304ea036236f6d07b
SHA1279719c535b81ec7a04d9e15313d2920ca5d31f3
SHA25682d02404842d162c9a1ef2b14e6b0965559ea87710d660c28915d7bb0e8b51d3
SHA512475ebe90401285e948177180db3046cfc21077ab92e2131ab6a4242152651889d962da8f5019ae4be2b9e0d27fb96c328c675ded0dae23566198247a457dfda8
-
Filesize
5KB
MD55dcad50a2cc82f33379f7987b6d6c37c
SHA19c0cb862dbd32227455b657fecac1e15fca3687d
SHA256e11c373f318c97eadb5a41889be8e1c458cb053fa8f78e1c1e6c0cc9c1ebc1d6
SHA5126926a37e71008f8daf8dc4c31cb37d1ce461f4f7652a11e903b2f0c7b08af772d255f614da7496a73a9c58bec4c4373d8cabfb8bdf77ee929444d29103a93b16
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
147KB
MD5085292000bdb0bf29a28c39759774cea
SHA1cc6c68459f2f6b1261676f2be85d6fe23ad0803a
SHA2562e907c2b55aea5e274ede49a66eddbe28ce28e58a01df5ac1eaa5257dc4098e4
SHA512051b5e74c78dc0cd94976af06cd62fa110d3ec2da8be03b2ee6c33b134795d3d8102d59a5a663dfdd33eaf4d0a8c4bf8adaf3db6f7f37f04d3d4c889b806bdc2
-
Filesize
147KB
MD54aefa4b4564d820ad7db9038a24747dc
SHA169ccc11a1b451350786ebb65fd9fb4da2e4246cf
SHA256559b9c6538188f7a1d0ce07ba13318f95223e379849de99c36b0cfd2e5dee90f
SHA512c1975d2bcd481a6a3d4ebf1cb999270522e98719d24def779e9d3f83bf4fc3e2f3c821e841e07f1a04b604734d0143f8423120113a378d05e91f7bf09d4e13e4
-
Filesize
83KB
MD51a12bf5f49781fb6f92ed0956a9cb2dc
SHA1bd08deb0b6f9c0a1a98a65906fc828ea04b6ae29
SHA256e7bd2e0ef8f264c4231d86e1252962159197adf9a0e388edb027dcd1b98e924c
SHA512a4ad0418fcb6d0ee40395dac1197593358fd716d62391f6f6eaf7548c3d984ad60b925b9e08ef932345664db455fda9c44ac8dbe1bcacba75ac9bcabde06af51
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e