Analysis
-
max time kernel
73s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
twin's mod menu.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
twin's mod menu.dll
Resource
win10v2004-20240802-en
General
-
Target
twin's mod menu.dll
-
Size
88KB
-
MD5
9a3bb049f2033d41357e6e36a66a41e0
-
SHA1
b754ca16b6159a8da28284992b2ff157093ddd52
-
SHA256
2f557ab2d7642b43c3e96a1559f5b49b20435cc22c799fbc8ecba96569b1d4d3
-
SHA512
2265ed3f8d8265231e40cf4dc8f50bc1008db3a0743522978087aecf1e1d47e6242644c0a5181bd4ad5a408a7981de9de6a2b50a5838e94d9d21f5182789435b
-
SSDEEP
1536:AryRL85PhSu/zdW1m4h++GGnrxK/MSYnyT36Z2gKs7xd7QmNdGVqb/:AkL83BzdW1P++GGndS36Nxd7QYdGUb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6CA3DB83-3A4F-11EF-BDFE-E649859EC46C}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D578A331-61C7-11EF-BDFE-E649859EC46C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2388 iexplore.exe 956 chrome.exe 956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe Token: SeShutdownPrivilege 956 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2388 iexplore.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe 956 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1820 2388 iexplore.exe 32 PID 2388 wrote to memory of 1820 2388 iexplore.exe 32 PID 2388 wrote to memory of 1820 2388 iexplore.exe 32 PID 2388 wrote to memory of 1820 2388 iexplore.exe 32 PID 2388 wrote to memory of 2452 2388 iexplore.exe 33 PID 2388 wrote to memory of 2452 2388 iexplore.exe 33 PID 2388 wrote to memory of 2452 2388 iexplore.exe 33 PID 2388 wrote to memory of 2452 2388 iexplore.exe 33 PID 956 wrote to memory of 2536 956 chrome.exe 36 PID 956 wrote to memory of 2536 956 chrome.exe 36 PID 956 wrote to memory of 2536 956 chrome.exe 36 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 2564 956 chrome.exe 38 PID 956 wrote to memory of 1720 956 chrome.exe 39 PID 956 wrote to memory of 1720 956 chrome.exe 39 PID 956 wrote to memory of 1720 956 chrome.exe 39 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40 PID 956 wrote to memory of 584 956 chrome.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\twin's mod menu.dll",#11⤵PID:2932
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:1324044 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ce9758,0x7fef6ce9768,0x7fef6ce97782⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:22⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1424 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:22⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1320 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3520 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3664 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4024 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3464 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3948 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3884 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3940 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3392 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2808 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3420 --field-trial-handle=1300,i,17068397095602400937,3622233516552238611,131072 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea2c51bf4383162a84357688bc9bcbc
SHA1f6fa840026ac6aadbe7124fdeec68f2cf1b533ab
SHA2567d864a2238083a8785c7bb808992b2613e203c1f78b982ecc8e6c866ad559c12
SHA51262ae2036a71113473d70d41cdea951c1d6282d27e33e521d8921b2d0cc23ab7add2065a77cfffefbc4e34d74771d2c96d70e1cc3e4f906cd99bdcc9096e69584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564eab8f3ce411fa918ba8ae3a1816e26
SHA12e7928be1c98de5717de179661595dfa51d32a0a
SHA2561688717358e20ab57e8a97130697989bf3ba5f54a0fd3ed6975abb26c0f2930e
SHA512694d0e4f280310d0143096cc7ce12b3f3e232ec7510abf284e25b90beffff3b2a53ec23b5e980b84bbcd2fd557758dbefa34b783c66e392b3eac9538eef4b67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377dc21411e2945a7da4faca6a99de3b
SHA1352a15445f8ada405cde6330454b1829930ff234
SHA256ba61327b6eb292de23b71b22832237f029a0ff1cb3d2231138f6d3e065aca472
SHA512e23389c516127bf8a5dc563444e084e58f48a27f2a59e69c967ee501e131f52c0cc945d4ca0f75fe9d88c9b9b21e94acd8137f33997ae0ae8655925909121896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd53d8ef68aafcd3fcaa19d3b119970d
SHA1eaa1cc63239818efc67523677c247b004154f090
SHA2562b43cfb725adf0889aa3894d149fae5be225be9ce59383c3fc13af65183d1d8e
SHA512bfd43330508701c6cb7ee935162f9d69add8492a82f66c399b74770168cf75f18d4473ef500c52588bd7dbde81c71a58377c72aa777223071a748f7b7be5de93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277a8522cecb4d2353a1857b3175e3bc
SHA1422b27bc984937afb5d9f07b478079542a9889c7
SHA25621cc10289cc02d13f043c349ef9a35b6dd9a9654e9f70b54d252ec980d4ebeb3
SHA512957a611fe7404e99a4b3654d7435d380458e6b8f53fc8ed7f84991b26f2780f60f01c6c57e79f3582253d8b9de5665aa5744abdc97fd504a9613fae678932d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581b045f712f8ce4fcaa2f073e66e3cd
SHA1720c077649d2144dfc052ba66550b009c6d5d8a2
SHA256a207459f8d7f7079d475ecfff744dfb59dda6c22691e2813c8207b5cccadf63c
SHA5124ec748729ded1aa55d7ff292898f492f9e333434d2987f9549675c837a2e7313be326531ac903ae92840f88f2754a31b50c41a2763235c684236e2a208f26e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c27c31fde4baae0d64a08c9fc1ec6b3
SHA1475111a499d3061b691bebec2dce35bec4a0583b
SHA256079b84de3500b0326c30824d99a82931014ab5b8dc5fe946fd2bcbb2aeef3a83
SHA51254897192c3dd2100241c45cb3d47e007bfe05ba1c151b3923f60b1a24c9d5a1a68f66f567c5b2b4f1bd400568e756414629feb1641768dd39a6febfeb9ce8f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51236c979cfe663d8b3e437d7423d85bf
SHA163eb4cde38c49069ee60f3337875a66751553c1b
SHA256696e0e9d9fbf7388e40e08e6585f90e1ef567fad87454ca036dbc322ef4f0c32
SHA51262f2ebabff094073beff12cb79650f7f1b7ed3b11f5232932a8c6d4efaadfe0564613a7abbdcae62e5a3596b76f6f3940f45d41778c88b9106b19c16850d62de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbe933ba9e18c3a009a7456da139a9c
SHA12f1b2c75389451651badf4150bc93ccc8a966130
SHA25682bdbd2093348a09a95cad8b0a6fb0eb1bec87d3e07aff13fb1fbe39e446d7ba
SHA51282d3a6c89a9f2cb7dc50db8bfdce226512df296e59e7717066c5c2174e714209d1c34222c81045dc6bc5515d630b8af7ce3a70030e3d2f723fc838ff5f0b1ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27072e0ac1425610b3d015369ed9389
SHA1ea9b52d97561ca397d9a2fdf6a8f2e2088e60ed3
SHA256dfe46d5b614f97f1504ef0cecfa8d3aa6fd2222a62d68c3ae28eac4b3a53d1a4
SHA5129baede1c46d0fb12aa43ab794f6396a495d143d615138f5b19948004c939ffbcb82588db8b6bc04dd8fbbe22b714dc44b9e264a320bf700303949fcf55999ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540295fe2e335ee5b5b814c1a9070375c
SHA15aa42edf439b180749b3a38db4e6b3eb0d7bbcd5
SHA256fe5c54e9bf55d8f33eca8e09267820ccabc311cfddd6cc624d6ab91d8be15c82
SHA51258919f6d3b1fb8b18ab675a6c965158be68da0e1c22be2b1f0b009d74f2728583ab8ebea491c945d53052699499255b60dc4f6188bd2dfc87756f8893a6f4f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67961263be1472cfbe71dd3ecb754cf
SHA162e86b752194340c78d5ce85bc94dca34c5f7814
SHA256be0df5031b050e828931e67ffca5fdfffa68fa0a50d3a2fd619dde10566bb249
SHA512cc3e9cc8599dcac59558ae082fab13cddbb1a65cd858e048e7cbf5fcfcf7024e7f248e78e623c3749939117781fe36caab1eb08d1599b92b245f2fddeaa91b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0026d8c9371a12dbe16a113adcae0b
SHA11f1724e741685e71f010e4dd4ccd88a46eb43261
SHA256bcd861e62eeaebfa8c96603786f5b2f3f12b230f82aa0fe2a737362901f8d0df
SHA51216df758bbbafb3c018c0d8391685c3464fee8f78a007188104ca77359a75d4b223d1902fbd27c3d2909f8997444d3de5d2bf4d132cf5e76f3f06eae3076748bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad201e68beb0f59448d2aea9da6f7a8
SHA1b9796f994421b64ff26e83c642a54191c2d6a309
SHA256b00b76a82a9acfe102eb3813501a77571a7aa1fa134e9d99c6ff2b0649eaba20
SHA5125c6cef3182b15690f3d6b6bd57b47371050b4619df9647df1c544dd1629ee87ce11b4d9f4f87f7740b7489dc68b8af59ffa77f76a02a309b2bac08fe46eea2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6812d3d0a1ba77c88312b55f5e117cb
SHA1095736771b531f5786a6085aa26006243e3d0d1e
SHA256a9f9729a80efbe18e9da43a360d2f8c7579b1f8e8549654662ede080de4225ae
SHA512e6413f8ea8a787a5c69be3763ecf16f26f9f16c66dcafa2b77039cc57c8aef3c132aa53d6c1fa681e5ee20991856261426f11482d10f11daa12d32a0ad8e8832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3db3a7d16ed1ebe82d89791b2cb03d
SHA1eeb4d4dcb5dca5a2be242d18df43bf132098c801
SHA25695f24e89aaba02b28d8aa395fd5d87e9b225690bcbc19b699fbcc61a9d74c272
SHA5122fdb7a90ccaada118ea5666a3eea3ba4c8ba1944248675ae64c8fb7cf8e6128a835f029ce55bd7cc46fa47235cca7ddb7ba35ace1a7c8490149d7ac6c93a1f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5cf4f9e8b790286e3b6b7752f3cbeff
SHA14abe0147da4809dcfa19fdc64a737fd4acec3206
SHA256082bbc0c79084b4695bf5dbb54e449862b4a32cf660555033035525d12b1a89c
SHA512d404b0fea7b2eb118147c85a970dbe0b4ed70d951404dacbc16e0ca6446e15f1967693e4c26adfb62e64132082fc9af39ccbe6dd1b1d307b459f79f9940ec540
-
Filesize
314KB
MD5e6a055ab0e173b53334aac44753e88f8
SHA194c82644623915df4375b0175fb8e5fafd299e1c
SHA256d4b4047a8fe5a96dd9792a933f21e8bb03e064f174f5c060e408ed56298e09b3
SHA5127bfa54c85d3718abf0002239b068cd033ef7ff869fbca3d83aa9c2692c8e5c5221a836248b0b824a38f09dc4dcc7e26fe5dbf9d72920a0b8d27d7fecf60f40f8
-
Filesize
96B
MD5f98925467ca492dbe2487151f9c97ce4
SHA16e87d90625c18c10acf73c649acaf092dfd6d5af
SHA256b341266e058f8b2eeebe44aa74a8dbae7ebd05b2f529c91357913cde903c7703
SHA512ddaeb8049975bff7c20243880a9227c8c6ca93d7c858f33b7ccab5e30ca35b017fa4970730fc94a61259a99e027d9117ef83c2be1a569eeb346c4fffe12d3c63
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5730ed2c0841ec3f651d7b8c281a78d1f
SHA1c1b3a918db1bd792ad018bcf2c03610f8766f3fb
SHA256359942d660f1f3ded97b80561e995d9cf18607ab312d57e5c5667a3c09cfe09d
SHA512dea4bcb7ce6f91a22013752779f9166e7637a26ec6b0fd247611a72f4c78eaa752aee54103d6fdf9275c86e8dde83c5b4663b9777a512c8eaa4cc1f39d84501d
-
Filesize
361B
MD59fde188dbeb45807afef8aa7cac37c9d
SHA1d144cdb13f76c61f4072c26ac5b2475d483b7e9b
SHA25616e9db8e1f9168fe0f9242793cc8358c8d66a2c39b8f5467db5a4b835d6be024
SHA5123f2da0c4efa7aedffc2054f376b084aee67966d2dcbff047b6ab92681a37889577d204afb178da75c5b1349ca3604ea894e914b6fd3abbce3b50d7bd6279e2d3
-
Filesize
524B
MD586a9131a9cace97d832c0b12d3734eb9
SHA1002757bef4e110b551a2c6772d93d9719d337637
SHA2567d8ece2cd8f565e91aa6d4b1de42dc024d7b4db7da152baa34d08545fe2dfb1a
SHA512342fd91cd3a70b24f0a3b922fafad6ac3e9333dfae788ffb7c69964bd2da99c944e5a0708460c4a40bfe72a4646e3e3e17a0c370f627ed1006d02cee1bf4cd61
-
Filesize
7KB
MD523dae9cc254a7373602496145578289c
SHA13685cb7d1dd666ca7e02c26f62fad9d61885ecd5
SHA256ac4cceefa565e7ef1e197544f9fdd44ddcc69f011c4c7652fe67748d9f8f3015
SHA5129f9531e8d2da027d86e725511841bf3116590f910bc9628ca88bf8c06c06956e08f25f0f6386040eb81f391f3801efb78c82b90f074b0920a4653541280bcc32
-
Filesize
5KB
MD50ef93db8b6a9e284fd9f9146d6163293
SHA1a6ce9b0f0454f7f1252cf01d45a28ce362915455
SHA256c09cd65df75db1d25a81aa013b7f55a7d570fa4de9e05f66cafdd86f38785c55
SHA5126a66af9d0866d52c7ff874f8936699cb1aa5e0964a426de27b3f45a4cd367029297247b1909aa04843d659a7e2c86aa9188660002105645342de4ef7be8d4433
-
Filesize
6KB
MD5cba010849253848fea828a95d246ebcd
SHA1845a16385ce0c7cc87ee1bb74cd40b966dc8ef56
SHA2565f3544483868f13f7792eea5d4e487d0137956117725c0fafc69295ad76691a0
SHA512b02075a4e07637a673c3c953eeb0a83470ac630eac19439fbd454f2db714fc9974262ebe07317fdda4029fbe16b927a79c9ec81fc041a46b7ec1c346b9776f70
-
Filesize
6KB
MD50a055902c2c1dad13c4b75071cc75e4a
SHA1bf9071797aff3f8241c7ddc2f4eebec89413edb0
SHA2561661ee7c4d994a2cb1f46000b8d610fda2b90b9149f38fc5c97a7d3477ac0a94
SHA5129ac96d98982cdc75cae42c772cc7d191f26c8b35ba2b1f0c005afdebc35727018a3a2ed07280cd0820f06e5affacdb3527d573a4c1a40f802139bf9c2ae6b451
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
314KB
MD5516af84534e88aed3ab25d465550209b
SHA1299b998a143b3fe72aa2c357885b3a67138a9f6e
SHA256981a07d04a03ec52412ee146f9112f6fbeeeecb03894b34948a68cf440a885ad
SHA51278b46c06fdc4401c3dacf54af372e173ee22e3b59b165fc7e7b00479c8b1a0842f24bf93491955b83a4fbc84c16498a8775b91d47baf34652b796c79cef609c4
-
Filesize
314KB
MD5aef8f5c17b832176592305a1ed4dfda4
SHA1ac41c1a84004870bfa809ccdcf937263734b9b9d
SHA256c74deb2e8f07be3231bea53e41d1b11a0bd4697315c62e8ea918ebf09c69c061
SHA5125384d14da17ce87a8a283e12ee2cdf48a6428dc1ca43b2c2dac243522a457166d22ae1895b88cde78c5dfada0da78136ae36ee61b05d0f66caab65b6f17d6a41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5952884775a4b90d07ef44b6a9afe7a40
SHA13b2501d759b0a17a7c389a5f7d2f0842dca39d4a
SHA2564991c358c5c454a0baff3bcb847716dadf5b56416a885e5848ef1cd253520cdb
SHA512b6d7d609314fb90e8b8cbd92ab50c3ac7c1c0fe507205e90a8cd25e44417b1c786c90286c7b5ddd8dfeeea885f2171fff554518b62bd335b83268608d0b50bae