Analysis
-
max time kernel
53s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe
Resource
win7-20240220-en
General
-
Target
ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe
-
Size
1.8MB
-
MD5
d933a1e34002d784b05aaf813e96bbca
-
SHA1
e22779e5665482f4f35fd5ab87d6075d9932b158
-
SHA256
ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c
-
SHA512
e7d2416680085f7cca918e353703d3c7087de72d17ce141db2c4eb77e1e727f195e913d4d7945908b698284bababde3a8a31367149e7f278254959e763bd4948
-
SSDEEP
49152:kiBbKIGjDt/gWtQ3MLeJZdbvmhS0gRAT18:j2IGdRCpbvmhS0g018
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Executes dropped EXE 4 IoCs
pid Process 1040 explortu.exe 320 explortu.exe 1684 dfd8baccba.exe 1836 0f315ec3a1.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine explortu.exe -
Loads dropped DLL 4 IoCs
pid Process 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 1040 explortu.exe 1040 explortu.exe 1040 explortu.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explortu.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" explortu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\dfd8baccba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\dfd8baccba.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 8 ipinfo.io 39 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001738c-84.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 1040 explortu.exe 320 explortu.exe 320 explortu.exe 1684 dfd8baccba.exe 320 explortu.exe 1684 dfd8baccba.exe 1684 dfd8baccba.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1040 set thread context of 320 1040 explortu.exe 30 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explortu.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1368 schtasks.exe 2176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 1040 explortu.exe 2092 chrome.exe 2092 chrome.exe 320 explortu.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe Token: SeShutdownPrivilege 2092 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 2092 chrome.exe 2092 chrome.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe -
Suspicious use of SendNotifyMessage 59 IoCs
pid Process 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 1836 0f315ec3a1.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 320 explortu.exe 1684 dfd8baccba.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1040 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 29 PID 1728 wrote to memory of 1040 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 29 PID 1728 wrote to memory of 1040 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 29 PID 1728 wrote to memory of 1040 1728 ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe 29 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 1040 wrote to memory of 320 1040 explortu.exe 30 PID 320 wrote to memory of 1368 320 explortu.exe 32 PID 320 wrote to memory of 1368 320 explortu.exe 32 PID 320 wrote to memory of 1368 320 explortu.exe 32 PID 320 wrote to memory of 1368 320 explortu.exe 32 PID 320 wrote to memory of 2176 320 explortu.exe 34 PID 320 wrote to memory of 2176 320 explortu.exe 34 PID 320 wrote to memory of 2176 320 explortu.exe 34 PID 320 wrote to memory of 2176 320 explortu.exe 34 PID 1040 wrote to memory of 1684 1040 explortu.exe 36 PID 1040 wrote to memory of 1684 1040 explortu.exe 36 PID 1040 wrote to memory of 1684 1040 explortu.exe 36 PID 1040 wrote to memory of 1684 1040 explortu.exe 36 PID 1040 wrote to memory of 1836 1040 explortu.exe 37 PID 1040 wrote to memory of 1836 1040 explortu.exe 37 PID 1040 wrote to memory of 1836 1040 explortu.exe 37 PID 1040 wrote to memory of 1836 1040 explortu.exe 37 PID 1836 wrote to memory of 2092 1836 0f315ec3a1.exe 38 PID 1836 wrote to memory of 2092 1836 0f315ec3a1.exe 38 PID 1836 wrote to memory of 2092 1836 0f315ec3a1.exe 38 PID 1836 wrote to memory of 2092 1836 0f315ec3a1.exe 38 PID 2092 wrote to memory of 576 2092 chrome.exe 39 PID 2092 wrote to memory of 576 2092 chrome.exe 39 PID 2092 wrote to memory of 576 2092 chrome.exe 39 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 PID 2092 wrote to memory of 3016 2092 chrome.exe 40 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explortu.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explortu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe"C:\Users\Admin\AppData\Local\Temp\ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:320 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\dfd8baccba.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\dfd8baccba.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\0f315ec3a1.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\0f315ec3a1.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7309758,0x7fef7309768,0x7fef73097785⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:25⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1456 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1264 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:25⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2240 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2472 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3440 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3624 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3960 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4064 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4088 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4208 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4056 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:85⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3764 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4156 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4200 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1860 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3656 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=2768 --field-trial-handle=1316,i,11606289926182223202,3132995348450030701,131072 /prefetch:15⤵PID:1524
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
203KB
MD599916ce0720ed460e59d3fbd24d55be2
SHA1d6bb9106eb65e3b84bfe03d872c931fb27f5a3db
SHA25607118bf4bbc3ba87d75cbc11ddf427219a14d518436d7f3886d75301f897edaf
SHA5128d3d52e57806d1850b57bffee12c1a8d9e1a1edcf871b2395df5c889991a183a8d652a0636d5452068f5ef78d37e08ce10b2b2f4e05c3e3c0f2f2230310418a8
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
148KB
MD5d7ab03a03515bcdb1ba2120080d67915
SHA1f4afc6da40c58a59560bc172f632979e5c8e7c4f
SHA25671b8e5c1ff04fac184f2455602f424baef76e08d78aa61d2bb315c0b282013f2
SHA51246e143efc684acf586b2b564823602c115a1242a9af871a59f446a6f8def31bf91753148c217ba26f8fe79433d1c6ca5d1b3fb63e9d3bba94ff3f12034608076
-
Filesize
521B
MD5d28379ae0abd92ee1cf8ee1799ff3961
SHA1c66ee41232a135d8a1821bf02a1f6acb126041d1
SHA2565097c1f89eba209810322be08b0822574d17df4871ed69aa66bf9a83b1edc64a
SHA512b6092795af79b82afff1364d21bbe8cac90b09e8d79ee298bba45d2034ecf73bc0cbae92f7bed459be5c68af1d82dab0cb7ef7db75797de5b15b3f899b279b32
-
Filesize
521B
MD53388d8dfce34e552a3085995ad99c9a6
SHA19ee46fa4a99a7dd41cfacd9fc7538fbf9354cfa0
SHA25649303c2afe373989a0ef390d295a6a01eb22d54037130fe1c4853e9ee1de3c63
SHA51222ffefd8c0327001250661b1a160056db81fce49c3de4545fb34a38df332144106d35ceeae9536acd11b62d7c3fc4e81c3004b6345c31d86fde1875d7330b58f
-
Filesize
6KB
MD511914ac601df6460aa61d282820b9eaa
SHA1115c4563b81ece85ebd63891487d96a8901f9cfb
SHA2565b19c11b054fb50fa0631d5f7a85ce6cafa67571504d1a1d38dfb852b1b2ecf1
SHA512b608043856429fb070abd2e9cac97e6a33d692542fe4ca260db67dec475309900d5262a5cbd7e22cfaeacdf0ad3161def843fadbd7b6f437b644b6de7e0521ce
-
Filesize
6KB
MD55656c1734dc724cd6ff3535832ddd3e9
SHA1bb59b5e97f842d93d470d377b6ea7d9f46240592
SHA2562c8d7880134e0a5a8bc8f8ac0dbab7c502c2b0a10212cddf27828e832cba3a54
SHA512bbf7227e9233ea4b0a0b3cfedc255189d6eaf2dcd9e7f4e3cd81f1864c014e64b0710d0eb5d7d49ebd9067b01791c30e79b87e4f68f76296c0e09c4ef70529d3
-
Filesize
6KB
MD502f16895afbb27541338351ca3f6cfdc
SHA18d5a6346f864987452f0240b82fbe352c0629629
SHA2564455ddad757d5c95b4edce807cd3e3ccbb1a0cf37005329ad63149a0b542313b
SHA51259bf96cdd50e206d5aeb0290a96d93be688a22209b7a8eeadf6d11169b0772ec362fd32c0bf1380fab224f9f0f9099e984a21b15217806b65b4d988513d2db12
-
Filesize
6KB
MD5ce3d0acaa5e9522884741eafd29bd6d6
SHA13d104108b49de78b4cb2f0d888219f52d21ee2d8
SHA25678195ab0fe2d1d837646d7bbf09a401c940e7b44142752acebf3812f5554bdf6
SHA5120c7a8601510ec35ed2d77ea8f798ad8187b7bc926c7e06f3c22caa7da0689aacd8c1c08a217b9461654ab2dd3849e934ae227dacfa65c5c32928797345a74ba9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf7727eb.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
279KB
MD54259a2550560b77c4b9a4fe779af4bbc
SHA10d5277a2519485827f4bba5c3bc60109dfcc0dc5
SHA2569945ac79919d179febb5f4945672a2586e4ed690697c347cdb52370184549a3e
SHA512218c821da28cabbe6fb98ac21a558293a6589247d6fb4e25e4ad323928f10b9f8141505a81bcafab218f0415e0c94ca8eb46ed35d98d2a0a21c6f065ffc65305
-
Filesize
279KB
MD53d5aaee76d03674a9ffe6905511821a7
SHA1735d92afdde1cdaad7153204c540b7da20cd0a4b
SHA256b9895c07bba018ec0e6eab2b696c3ffeace7c8720289884dfb1e129348dd8a13
SHA512a8795ecf4631c9af86f53a96cf23666875ceeacb18547e0a4f6e293dd53a0b779e96b460e5a70a525450692e7650dd5330de5a86157ee089fd4fb04f033d76ec
-
Filesize
1.3MB
MD57e70f9c8759bd8f82a3d93c9773b433b
SHA1d24cb0068364b83774e773e344ba7e3407a41016
SHA2562dc4d19942c40513808bef745d0fa41f4abb8b3a05b12e86e60fd3232531adde
SHA5128c6b31bc5ddd741db5726f7fad6517c45df0cc089aaecd86e5270823c371dbecd78e4af9a272f75810b12ee6b9fcb0b97f3922278c6893a93bb790b688010083
-
Filesize
1.1MB
MD595bfbbd34a0f1a6c668f4336be9c1482
SHA1d997ae47072ee45f35d1c30bfc25e8ede9984ce1
SHA25695625cb70a539b1d5e94f4e554de06f44c8ff580c6606fa3ccc14bd8feb9fe4a
SHA512804781a2f87c4227b3c1c37acdefdbc10230fba70eda58d83dedf362e6568a3675fc02caaa86481bfd6ae2f2122b3e055c3a888e6d090ca445ea6715d6282e0d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
13B
MD5664d6df8f8c2a1c0070c76dc899bdfe5
SHA1ecad50c28cb7198031f012ae04dc891329c0c113
SHA256babf7a2114b317780fe56e9afa9b4c22f64b3611fb3ca2b707e18cf4b3dbb527
SHA51246af52348027c77fa53853cdd0472f0c38e80717f40c8f6e879256178176a3b1c35146a2cb7726e433c43d82687d027934479ff3e538b10181bfff0cca9083e7
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
5.0MB
MD55abefffbcfcb833e098dff88ca9c2cf2
SHA100c13b1547bf540e7106742f45e6d55f01e8dcf0
SHA256679c618e9cb42323cd0be32e9a9a55649e1700efa0a862a0d4a05b78e4dffdb6
SHA5123404324afa33be247f6b402703ce2f45af174e6faaff2aaa35b6b01b77b5fcc68454acc61399bc197fa4e3942e0d044f7ecaaa73aa7403d1bc2fea04bdad201a
-
Filesize
92KB
MD518e04095708297d6889a6962f81e8d8f
SHA19a25645db1da0217092c06579599b04982192124
SHA2564ed16c019fe50bb4ab1c9dcedf0e52f93454b5dbaf18615d60761e7927b69fb7
SHA51245ec57bddeeb8bca05babcf8da83bf9db630819b23076a1cf79f2e54b3e88e14cd7db650332554026ab5e8634061dd699f322bcba6683765063e67ac47ea1caf
-
Filesize
14B
MD55e52b74c8e2a6d79f949fbb4eb476b21
SHA1f1db39c705690b41243b2af96d9dd9d1a36a1f78
SHA2567e68391432f9de6eb838bc2319f59e464e2db243aa5af00038f17efe9d073f6a
SHA512301c91c56878cdeb452816a409f1cc6d53f33235fe6ee4ae2ad8cd84d01debb3fa9d7bc7657ba5e22c3a7352e80a5997789dee640d27f7b9300825489ad95c92
-
Filesize
1.8MB
MD5d933a1e34002d784b05aaf813e96bbca
SHA1e22779e5665482f4f35fd5ab87d6075d9932b158
SHA256ef5cc39bd536f448498941d058596883d45a1f0c171ec0e6601c73d40671da3c
SHA512e7d2416680085f7cca918e353703d3c7087de72d17ce141db2c4eb77e1e727f195e913d4d7945908b698284bababde3a8a31367149e7f278254959e763bd4948