Resubmissions
23/07/2024, 00:00
240723-aatnxswglp 722/07/2024, 23:36
240722-3l3p7avhql 722/07/2024, 23:36
240722-3lyfgavbrg 722/07/2024, 23:36
240722-3llrnsvbra 722/07/2024, 23:35
240722-3k79aavhkp 722/07/2024, 23:32
240722-3jjvasvbja 722/07/2024, 23:30
240722-3hda5avamb 722/07/2024, 23:28
240722-3ggl6athrb 722/07/2024, 23:16
240722-29kzlstere 7Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/07/2024, 23:32
Behavioral task
behavioral1
Sample
Lofy_Cloner__Casa_Cloner (2).exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Lofy_Cloner__Casa_Cloner (2).exe
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
ubuntu2204-amd64-20240522.1-en
General
-
Target
Lofy_Cloner__Casa_Cloner (2).exe
-
Size
8.3MB
-
MD5
66e6140ba9e19c29529dceb265b17b41
-
SHA1
fefdb348596c3160bac45888d56e6e940a452907
-
SHA256
bded5cf8faf4c7ff8a7582538cd325da029adcae50b14f38ed4dc6adabc5673b
-
SHA512
b0a26c3d34e1f1043e06ca759d645d10c7b1ab6f05a1d5e1788714b0d568c27f2763450f2af608cf01c7947dc7f55cc403dfa3355d51c45227f2951e4d5a6944
-
SSDEEP
196608:GJi56vBAoiL2Vmd6+DNnNgwQ+dtLZ7k30szjad0tNNlezM:GIL2Vmd6mZNjd7NszjJle
Malware Config
Signatures
-
Loads dropped DLL 21 IoCs
pid Process 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe 1604 Lofy_Cloner__Casa_Cloner (2).exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 77 discord.com 78 discord.com 79 discord.com 80 discord.com 15 discord.com 76 discord.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661648131268161" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1604 Lofy_Cloner__Casa_Cloner (2).exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe Token: SeCreatePagefilePrivilege 4628 chrome.exe Token: SeShutdownPrivilege 4628 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 1604 228 Lofy_Cloner__Casa_Cloner (2).exe 79 PID 228 wrote to memory of 1604 228 Lofy_Cloner__Casa_Cloner (2).exe 79 PID 1604 wrote to memory of 2060 1604 Lofy_Cloner__Casa_Cloner (2).exe 80 PID 1604 wrote to memory of 2060 1604 Lofy_Cloner__Casa_Cloner (2).exe 80 PID 1604 wrote to memory of 764 1604 Lofy_Cloner__Casa_Cloner (2).exe 81 PID 1604 wrote to memory of 764 1604 Lofy_Cloner__Casa_Cloner (2).exe 81 PID 1604 wrote to memory of 4512 1604 Lofy_Cloner__Casa_Cloner (2).exe 82 PID 1604 wrote to memory of 4512 1604 Lofy_Cloner__Casa_Cloner (2).exe 82 PID 1604 wrote to memory of 2524 1604 Lofy_Cloner__Casa_Cloner (2).exe 83 PID 1604 wrote to memory of 2524 1604 Lofy_Cloner__Casa_Cloner (2).exe 83 PID 4628 wrote to memory of 2512 4628 chrome.exe 87 PID 4628 wrote to memory of 2512 4628 chrome.exe 87 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 784 4628 chrome.exe 88 PID 4628 wrote to memory of 4580 4628 chrome.exe 89 PID 4628 wrote to memory of 4580 4628 chrome.exe 89 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90 PID 4628 wrote to memory of 3388 4628 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lofy_Cloner__Casa_Cloner (2).exe"C:\Users\Admin\AppData\Local\Temp\Lofy_Cloner__Casa_Cloner (2).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Lofy_Cloner__Casa_Cloner (2).exe"C:\Users\Admin\AppData\Local\Temp\Lofy_Cloner__Casa_Cloner (2).exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Casa Cloner - Developed by Noritem#66663⤵PID:2060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4940
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7febcc40,0x7ffe7febcc4c,0x7ffe7febcc582⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3364,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3584,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4828,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4572,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5200,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3804 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3472,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4660,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3588,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5272,i,7839831245028313541,5814075858801851583,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7b7f2188-f800-4a76-ad6f-7ef2fc72b156.tmp
Filesize9KB
MD5f67e42e439b0fd4a2982b95dca74b3fe
SHA107bb3d00b333ddeef1bbe6d02a1fdc6cb0dd3758
SHA256a155b771441214dab36cc25c9b08e1e7eb47d7191d52401b7a0ff9d639ad0905
SHA51214751688eacd8c06516f7ff51c0c0910ac606bbced65c67ca03d84ecb45c24a604205253d70f7f7d4631c633661b37e1f784b106033ca88c159b61d198b0eb2b
-
Filesize
649B
MD5701306027a68539cf768e9b550e326f9
SHA105c175d9f4b2ca1ea0208d56e36a8e7600afa81c
SHA25683612738a531985dadb9daa0363dac3ea92dffce9fd1678612475cb8896b4ed1
SHA5120b528993de02293b8e0ed77fb0280956699be3375872cd4c87201e676115c96bc4f87d10161d7a6aa3c3b368088d7858d1503a2ab01702205845d3ab2f52d9ab
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
1KB
MD53cc92cb552ee45d26fd2c8c3ae79074a
SHA123b28dc94b15f9e080c3b91d84ae35fc11f2bad3
SHA256cd9193e5120848ef683262343639e3d879b68d5ea9576ed0d2c6f5da31ab150b
SHA512535e359a8c2ec82fe0ecf77d7c437607537cb3d01a42546a3245e1ca6b3443413d8b232068a0a75278fdcd31e37c86ddfdb0eefe2b3f4633874a5134b6c3e25c
-
Filesize
2KB
MD5738009607b1d8c07ac8ff8ccbe32564e
SHA1122d33da8136545d6f1ffbff3800c065cec13803
SHA2568fbce709ed01335c9e91cb20b815b4ea6cd1dae4d84ec766f13a8e1ac974fb4c
SHA512a93e60e8d3ca9311325b80727096637d04686b1b60436492ead9650fbec9dd5b3d5fe34a0072f64067d14eae782b7ec2ae8968761b6cc03939f2e4c2395818be
-
Filesize
6KB
MD5ab13dbfc4fb7f27161cdc4c77d9203d8
SHA1d53f32c43c00e285b1a94b773993e577d45c1df7
SHA256071aa54490af0deb7cee82d266d7b08a6a6b64384f1d09e73f53415f04b50bdf
SHA5128bb1588c7b17bb45a6c447c1ae8316b48849060075a13345106c985e109f1d25fc6e34f1c59432f8cc240117e4e83adeeb07681e5815eeaf95416451ee364cdd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD55574b5f8cd108d6f7cf98c4802de82d2
SHA135b013d166a048579a9ac291cb9f06855c10f88a
SHA2560212688bfaff7171183d4c1b1828fd9f4f918ed6304c324531c8b446231b15c1
SHA51246dca2c9d5a1b91140e579f9bbeb166551af5e9edd6fb1129f3735c1dc671ae9c07dd1a78e3f018d51b1c9eca7418e4058e8d613e43039ebaf526829baf2a163
-
Filesize
2KB
MD578472e49e4cd299463992ad3d1005b15
SHA14d90ca1ea67d28108f3ba30efa15667ae8e9565d
SHA256459a8977106c5af6b270f352a184fc64cbc600b13d3018fe26bb336437469439
SHA5127d3bcba46ea9bd935abac6b426a39fddc674e5dc32866f1e68544af5dd596745337cb8e131ff9eaf00c5c6cc1275de8ae2749538739227cc6f007567ff47060f
-
Filesize
2KB
MD50d6a8538e946cdfe838f2dee783c6534
SHA1958f2a0aac9780fa7aa285dacd166026fa260488
SHA256489393c188726446ce7ceb5d3253423fa5b241c7c6e0a8823f3b0b580ba7ceae
SHA512911a0923c729033d1f85bbb316725abc52ac7ab4df78aa1a080c8cb6f45fe8f651b24661336c687e5f8e64a223bd98dc367e2d84ed93a5c407dafc4a4375f260
-
Filesize
2KB
MD5fae76619688017ca6356fa09b1d953b3
SHA144382e17eef5f18b6e9b69aaad5b23da509e62f4
SHA256c447d6d78cecd2e8b3d5c27a0a129b579826aed0ba7d71b7f91bd8ca2a23f99f
SHA512f0feec924dacb6c4c1cbb2cc654a0f10e512114527974e1191a0d78c69c157b1c9f94770ad421004df91b3e488c95748e12fd5b46a6ef5e7ae8dea5334043f1a
-
Filesize
352B
MD591b1a00c1f107b8bc51dfef0e5ecb42e
SHA182590b904b2278dd50fb2dd19ea274e8c2ba6665
SHA2563fd55c3dc48167d83b01ca2982bdc28a3a8b51d4653c1047155b98d4437b4bb5
SHA5122f34dcd289a89beb791e3afda727408e502fd02148053a880aee8353f63cd58339c7154962d200e4a4a95ca906cfad5e2a3a3aa57d9ef6a718c1e1348e5f261c
-
Filesize
9KB
MD56b557be186d53066ec291ee8d4a89ebc
SHA1edfaf84d8a13f933d68f8d94b220eb79497e43cd
SHA256dc484cc947b1d1c3a25e44110071f4c23a64c9c71cc801af4dca79c7ac023568
SHA51228f0f5ffc6e4229c9675f7a7d4908512db237021551dcd83abe31892152d05ebe0cb2931e049626666438f04af5cc5e26b5a4ac706f64c76774504ff8e1495f0
-
Filesize
9KB
MD5a4cbf8653697b568e9a3ceccc4e24874
SHA140e270855cf07b8b64def0d00a178088cabb083a
SHA25674376b40e79c25e9043ab2557e9576ab172588a9f5ccc300a9d31dbd3f73cbca
SHA5123b9f3a52bc9eb4b562742cc05690895e84d9c433d1c78f9b60da013b6d521a038bd467ba64a54106d018091dd71714f539bcb34c8b5f0eb1b2d75ecd9dac2eaf
-
Filesize
9KB
MD5f0c52a9e90bff183179e53727ebee9f1
SHA1c92069c9033334df6d1e5e701def73643d61687e
SHA2561db27bf5fed39b9949434a70e305bbe02957781df65ca5fcc632bda2a791ed71
SHA512ac56f5a17cbb8f16e2faac8bc32aed19394489fe5e36ff38d13ca1b27c899cc85d0ab64c7de9b289545ec9382d2f1a6c241f62dd9950c82325f60f2aa2a0d032
-
Filesize
9KB
MD5cef94b7e5a0feb6e4c1aabbb652e6316
SHA12cd49ff199a17902b49165ad6f9b2bdebd5b2d6f
SHA2561945779a2014136f201a1989841e03795089b887fb11a9da3bcb29a6d5d5bd57
SHA51241a8d9338a60b9f568a6e0e42167163796168907c43bd772c5bf7a8079337a4bd06c6a83cf1ed766253b1c87208d6a0f6ae02b270c1bb44ce87bf1ec942c3b8a
-
Filesize
9KB
MD547fab4fa44db570ebebee70fa28153b2
SHA17dfee6cfa162a1e8b259c32a1cb28c6ed6f000f0
SHA2567c6708968202e72c61dbc0e56c7840ea6c90a41dd3bd0485efbaa8fd3a2a24e0
SHA51299a888fe26a5406470fb70db2cd435208935a1e9bc04622bdd91d75b39f87584fdde7afc145f23d5d992cc9a2da660e10399a6c1f4a9701710cc4c6a3df78d36
-
Filesize
9KB
MD59f3cfa48ea9629eec0a55ca7095e9618
SHA17c12904c4f05c70ff55e95a8af55907f8658d8f0
SHA25634efc461ce4d3bd06d7662199191368f4f134a3899440f90b2824f49359d49a5
SHA51243a565020d69a73b62db64a554924b19eff8428f853aae87b32af01c2300f22ffbc3e82d46e25e6d724fbf9bd139ac97f2e354eeff0e67fe112d81b2b62fddfe
-
Filesize
9KB
MD56c728eb3c6d3d4a5651cf9db1f7400d7
SHA1abb8102159a8f92884c6638d631d6a7d832bc941
SHA2560c973f2b82ac46324623ef124988fe678b16acd5dcd2a02f28860336dcad4bd5
SHA5123ff43a96a55637421a352007221f7697e9ffe94bc67a8b5b008bfa3d6c4998b48c1b4ab333ee12bb9842202bec364651c98fe19866b8586a451dd06a75788f82
-
Filesize
15KB
MD5fc6439f7258ae793db5f0fdddaefcb1b
SHA17de1f87d40ed0a0ae87f4c723b722e714afe5d45
SHA25617fa61c10b14e2abdd43625722f232aa6c2f734525bfef128bf261bd46b84bfd
SHA512e433e513d75edf348d8dfde730e9866a02e2a174247bc2c68e8355b51c4cea06a5c0c3b51ccb1203659fda7473da88fc22ab3db376e4b284a410ebede2b6b705
-
Filesize
185KB
MD5e130b2e1e5cd3f8da006de30d98afb21
SHA1aa282fb535834e98d3fff6b510e7628fd3d672f0
SHA256ae4c06fe5644897d48b762d3788c9481df3c5d0fd79e7dd5c4e48508bfdcf9fd
SHA512ae25723b740d635d041d895fdf6daba8db8fba83237d6ac1ce8cd32961710fce0ae2a248bddd0b003c14db1ca3574a6a3741d1340214e4664ff220997b164f44
-
Filesize
185KB
MD569865906964479f2ba44eec682ef3812
SHA1e1838c42a3d448ff0fafbe38160b52388a6468a6
SHA2560abbc186c4fb28c51e4a02f96d1c383e3739d383db0ec697ce4c0be4dcb2ad06
SHA512f9cf9a722697b10a0e2496840d23645508316a69da1595240f6c5b27a8f41537b8dc0854af7a8ad59c4b10738a9e558408d073a4c1c26f98b99d668bd417859e
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
59KB
MD5483bfc095eb82f33f46aefbb21d97012
SHA1def348a201c9d1434514ca9f5fc7385ca0bd2184
SHA2565e25e2823ed0571cfdbae0b1d1347ae035293f2b0ac454fb8b0388f3600fd4b6
SHA512fe38b3585fbfaf7465b31fbc124420cfbd1b719ea72a9ae9f24103d056c8fa9ae21c2a7dd3073810222405457beff89bbb688daeced3219351a30992a6721705
-
Filesize
77KB
MD5a1fbcfbd82de566a6c99d1a7ab2d8a69
SHA13e8ba4c925c07f17c7dffab8fbb7b8b8863cad76
SHA2560897e209676f5835f62e5985d7793c884fd91b0cfdfaff893fc05176f2f82095
SHA51255679427c041b2311cff4e97672102962f9d831e84f06f05600ecdc3826f6be5046aa541955f57f06e82ee72a4ee36f086da1f664f493fbe4cc0806e925afa04
-
Filesize
116KB
MD592276f41ff9c856f4dbfa6508614e96c
SHA15bc8c3555e3407a3c78385ff2657de3dec55988e
SHA2569ab1f8cbb50db3d9a00f74447a2275a89ec52d1139fc0a93010e59c412c2c850
SHA5129df63ef04ea890dd0d38a26ac64a92392cf0a8d0ad77929727238e9e456450518404c1b6bb40844522fca27761c4e864550aacb96e825c4e4b367a59892a09e7
-
Filesize
59KB
MD5ad6e31dba413be7e082fab3dbafb3ecc
SHA1f26886c841d1c61fb0da14e20e57e7202eefbacc
SHA2562e30544d07f1c55d741b03992ea57d1aa519edaaa121e889f301a5b8b6557fe4
SHA5126401664e5c942d98c6fa955cc2424dfa0c973bd0ac1e515f7640c975bba366af1b3e403ea50e753f837dcd82a04af2ce043e22b15fa9976af7cbb30b3ac80452
-
Filesize
150KB
MD5a6bee109071bbcf24e4d82498d376f82
SHA11babacdfaa60e39e21602908047219d111ed8657
SHA256ce72d59a0e96077c9ea3f1fd7b011287248dc8d80fd3c16916a1d9040a9a941f
SHA5128cb2dafd19f212e71fa32cb74dad303af68eaa77a63ccf6d3a6ae82e09ac988f71fe82f8f2858a9c616b06dc42023203fa9f7511fac32023be0bc8392272c336
-
Filesize
44KB
MD5bf3e86152b52d3f0e73d0767cde63f9f
SHA13863c480a2d9a24288d63f83fa2586664ec813a2
SHA25620c94846417ee3ca43daa5fae61595ad7e52645657fda5effe64800fe335ff0d
SHA5128643f94ece38246769ff9ba87a249b8afde137cf193ff4d452937197ce576816c1ce044c4ad2951bc5535cc3acf1b27e9f2be043b8175c5a2ca2190b05dc0235
-
Filesize
26KB
MD58dd33fe76645636520c5d976b8a2b6fc
SHA112988ddd52cbb0ce0f3b96ce19a1827b237ed5f7
SHA2568e7e758150ea066299a956f268c3eb04bc800e9f3395402cd407c486844a9595
SHA512e7b4b5662ebd8efb2e4b6f47eb2021afacd52b100db2df66331ca79a4fb2149cac621d5f18ab8ab9cfadbd677274db798ebad9b1d3e46e29f4c92828fd88c187
-
Filesize
73KB
MD5c5378bac8c03d7ef46305ee8394560f5
SHA12aa7bc90c0ec4d21113b8aa6709569d59fadd329
SHA256130de3506471878031aecc4c9d38355a4719edd3786f27262a724efc287a47b9
SHA5121ecb88c62a9daad93ec85f137440e782dcc40d7f1598b5809ab41bf86a5c97224e2361c0e738c1387c6376f2f24d284583fd001c4e1324d72d6989d0b84bf856
-
Filesize
152KB
MD59d810454bc451ff440ec95de36088909
SHA18c890b934a2d84c548a09461ca1e783810f075be
SHA2565a4c78adedf0bcb5fc422faac619b4c7b57e3d7ba4f2d47a98c1fb81a503b6b7
SHA5120800666f848faec976366dbfd2c65e7b7e1d8375d5d9e7d019bf364a1f480216c271c3bcf994dbab19290d336cf691cd8235e636f3dbc4d2a77f4760871c19ed
-
Filesize
20KB
MD56cfc03bc247a7b8c3c38f1841319f348
SHA1c28cf20c3e1839cff5dce35a9ffd20aa4ac2a2cf
SHA256b7fd172339478adaa5f4060eb760f905a2af55ce7e017b57de61ee09dcb09750
SHA512bd123566a104568e2ec407b35446cb07c660035a77a1e11a8d8d90518c1a83b6815bf694676fa003b074126dcd0594457195f835df7bc828df1195db6584d23b
-
Filesize
812KB
MD59425444153fe49d734503889ce8d1e20
SHA17676bc66117f1a65161c4f3da7cfb949e16ee812
SHA256da56060a8dc19c3c3b148efda5123de9ab7ef2bb568c1ca0ac1238d000ff5d09
SHA512ab890f7490acfa62be23989923ef430a0a26ad86bc65abcde0d2e4599ca659ab9933a87f99ead894025af202aeca89350f09099414f06e4570e3cef8aa1cef94
-
Filesize
259KB
MD5ea4ee2af66c4c57b8a275867e9dc07cd
SHA1d904976736e6db3c69c304e96172234078242331
SHA256fa883829ebb8cd2a602f9b21c1f85de24cf47949d520bceb1828b4cd1cb6906c
SHA5124114105f63e72b54e506d06168b102a9130263576200fb21532140c0e9936149259879ac30a8b78f15ae7cb0b59b043db5154091312da731ac16e67e6314c412
-
Filesize
3.3MB
MD5ab01c808bed8164133e5279595437d3d
SHA10f512756a8db22576ec2e20cf0cafec7786fb12b
SHA2569c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA5124043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
682KB
MD5de72697933d7673279fb85fd48d1a4dd
SHA1085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA5120fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c
-
Filesize
45KB
MD51b59c87f0871fed4ff2be93c5d9234ab
SHA17e5c8827a5b2dec5417800ab0a2001af46ab8924
SHA256b7151a6ffa3dc7436d09b1e35343801e11f423c6b391f1177254236ec47a3ad7
SHA5126092628a4c73ca2d29b6f6a0d1ed34627795363c89b2a45bfc75951f8148a288707231575183ef73d4fb24c022883ab3ab30da61c92664295fffd8a36e9200df
-
Filesize
67KB
MD56e04a1d41b0897878583702d398bdc88
SHA133f396728c57505b0b897b547c692a9cf8959a36
SHA256be9701a1c3e48599d8c22c2c371d5493e9a97fa5063022c110842ecb886214e3
SHA512f9fc5d2c480fb7edcad9490925b75007523adecdd0400adaaab888d12f1e67abfd614a142e38a93ba3b42de2e466f1aa0f48625e76bbe3868b9c308b0bdf4d66
-
Filesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4
-
Filesize
25KB
MD563ede3c60ee921074647ec0278e6aa45
SHA1a02c42d3849ad8c03ce60f2fd1797b1901441f26
SHA256cb643556c2dcdb957137b25c8a33855067e0d07547e547587c9886238253bfe5
SHA512d0babc48b0e470abdafad6205cc0824eec66dbb5bff771cee6d99a0577373a2de2ffab93e86c42c7642e49999a03546f94e7630d3c58db2cff8f26debc67fcad
-
Filesize
1.1MB
MD5d67ac58da9e60e5b7ef3745fdda74f7d
SHA1092faa0a13f99fd05c63395ee8ee9aa2bb1ca478
SHA25609e1d1e9190160959696aeddb0324667fef39f338edc28f49b5f518b92f27f5f
SHA5129d510135e4106fef0640565e73d438b4398f7aa65a36e3ea21d8241f07fec7a23e721e8696b3605147e5ce5365684e84e8145001201a19d7537e8f61b20cf32c
-
Filesize
78KB
MD57e620bd4ba53daae5df632f2774b9788
SHA128ec3b998f376b59483ad4391a0c2df2c634f308
SHA25684c696ed1b5ba6a3819d73b6f27aee93bca72286b32307fe259e23dfc1cfacec
SHA512e2d012dd9a7959c0e06340de3728d6e800b56cc0bc8d525c38dd49d9874095d2edc3ae06862d1a21e873c0da0678e8ab3bc95a57777d746f0d6d8b0c6c08c202
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84