Resubmissions
21-06-2024 12:37
240621-ptjematemr 321-06-2024 12:08
240621-paxg5sygkd 121-06-2024 12:05
240621-n9n5dasgpn 121-06-2024 12:05
240621-n9fs1ayfpc 121-06-2024 12:05
240621-n87v4asgmq 321-06-2024 06:25
240621-g6p4yatfjl 113-06-2024 04:58
240613-flzbfaydrn 10Analysis
-
max time kernel
31s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
Tax Returns of R48_765.js
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Tax Returns of R48_765.js
Resource
win11-20240508-en
General
-
Target
Tax Returns of R48_765.js
-
Size
957KB
-
MD5
0f597e6821a29bc87b36222f08eff311
-
SHA1
e7f24cd04de9b92c013d71d3de526461cfb33c91
-
SHA256
df018cc7e708b47edfe4f39769058ce0ba10a65fe653d3a32412dd504d3f2028
-
SHA512
693ed1331f7f048789c11bc661949519149c43e3a76b3b600a1990f74763500a6b4a5efb532921bcdb58b27f3a136af9ba63e2e1dce4094fe078076d0073f1a7
-
SSDEEP
6144:QQ5C90ha3hcY0c5OyZD5i8frkU+uKCbbBGZs3xh527wIy+6Y16vLKdYoiAL1Xl4R:TKF
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 4 2756 wscript.exe 7 2756 wscript.exe 11 2756 wscript.exe 18 2756 wscript.exe 20 2756 wscript.exe 21 2756 wscript.exe 22 2756 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R48_765.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R48_765.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Script User-Agent 29 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 7 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 33 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 29 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 37 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 24 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 25 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 40 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 41 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 45 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 18 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 22 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 53 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 30 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 46 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 32 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 42 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 50 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 21 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 28 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 51 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 20 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 38 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 34 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 36 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 44 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 49 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 54 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 11 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom HTTP User-Agent header 26 WSHRAT|F4850773|EILATWEW|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 13/6/2024|JavaScript-v3.4|GB:United Kingdom -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2488 chrome.exe 2488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
wscript.exechrome.exedescription pid process target process PID 2852 wrote to memory of 2756 2852 wscript.exe wscript.exe PID 2852 wrote to memory of 2756 2852 wscript.exe wscript.exe PID 2852 wrote to memory of 2756 2852 wscript.exe wscript.exe PID 2488 wrote to memory of 2500 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 2500 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 2500 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 664 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 768 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 768 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 768 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe PID 2488 wrote to memory of 864 2488 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Tax Returns of R48_765.js"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Tax Returns of R48_765.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef61c9758,0x7fef61c9768,0x7fef61c97782⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:22⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1568 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2236 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1000 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:22⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2216 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3560 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 --field-trial-handle=1256,i,4972916141982310056,5360538714550654464,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD59045be2205dbdf96401f04a43a0cb01a
SHA102accc1715f01a362dd24a7b34ac7b51307e09d4
SHA2566bdfb401d63230cc35891010e60d1a0bd3e2f25f2c01a0dd0debfa8f34ef3cfa
SHA5120a87e327d4628076c2a60f92c565c61fb407c2e90dc30c95cae87f5638823ebdca6a7b2ad595e18227bd82cbada3c1c46c0d0e31bf34af8dc897f1816e306029
-
Filesize
4KB
MD53727f789e15974fce9d63e034f3dca82
SHA1b0b113e15f7d33ad8d8419554495a0703ca325fe
SHA25669bde108518fcfac8e45cba82dc47216df72ab13473b41cc371d5ec111be39b2
SHA5127c00b86a952aeca02b6edbb247617e2cfbdb60e9a9b68c5d68c58bb0f184ae778caf19c9f8d1894fb6e6f7201fde56e8121a95783843295c83982cf783cd8337
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
957KB
MD50f597e6821a29bc87b36222f08eff311
SHA1e7f24cd04de9b92c013d71d3de526461cfb33c91
SHA256df018cc7e708b47edfe4f39769058ce0ba10a65fe653d3a32412dd504d3f2028
SHA512693ed1331f7f048789c11bc661949519149c43e3a76b3b600a1990f74763500a6b4a5efb532921bcdb58b27f3a136af9ba63e2e1dce4094fe078076d0073f1a7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e