Overview
overview
10Static
static
10XWorm-5.6-main.zip
windows7-x64
6XWorm-5.6-main.zip
windows10-2004-x64
1XWorm-5.6-...io.dll
windows7-x64
1XWorm-5.6-...io.dll
windows10-2004-x64
1XWorm-5.6-...on.dll
windows7-x64
1XWorm-5.6-...on.dll
windows10-2004-x64
1XWorm-5.6-...ws.dll
windows7-x64
1XWorm-5.6-...ws.dll
windows10-2004-x64
1XWorm-5.6-...at.dll
windows7-x64
1XWorm-5.6-...at.dll
windows10-2004-x64
3XWorm-5.6-...um.dll
windows7-x64
1XWorm-5.6-...um.dll
windows10-2004-x64
1XWorm-5.6-...rd.dll
windows7-x64
1XWorm-5.6-...rd.dll
windows10-2004-x64
1XWorm-5.6-...ss.dll
windows7-x64
1XWorm-5.6-...ss.dll
windows10-2004-x64
1XWorm-5.6-...er.dll
windows7-x64
1XWorm-5.6-...er.dll
windows10-2004-x64
1XWorm-5.6-...er.dll
windows7-x64
1XWorm-5.6-...er.dll
windows10-2004-x64
1XWorm-5.6-...er.dll
windows7-x64
1XWorm-5.6-...er.dll
windows10-2004-x64
1XWorm-5.6-...DP.dll
windows7-x64
1XWorm-5.6-...DP.dll
windows10-2004-x64
1XWorm-5.6-...NC.dll
windows7-x64
1XWorm-5.6-...NC.dll
windows10-2004-x64
1XWorm-5.6-...ry.dll
windows7-x64
1XWorm-5.6-...ry.dll
windows10-2004-x64
1XWorm-5.6-...ps.dll
windows7-x64
1XWorm-5.6-...ps.dll
windows10-2004-x64
1XWorm-5.6-...ns.dll
windows7-x64
1XWorm-5.6-...ns.dll
windows10-2004-x64
1Analysis
-
max time kernel
29s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 21:31
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
XWorm-5.6-main/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
XWorm-5.6-main/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XWorm-5.6-main/Plugins/ActiveWindows.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XWorm-5.6-main/Plugins/ActiveWindows.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
XWorm-5.6-main/Plugins/Chat.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
XWorm-5.6-main/Plugins/Chat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
XWorm-5.6-main/Plugins/Chromium.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
XWorm-5.6-main/Plugins/Chromium.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
XWorm-5.6-main/Plugins/Clipboard.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
XWorm-5.6-main/Plugins/Clipboard.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
XWorm-5.6-main/Plugins/Cmstp-Bypass.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
XWorm-5.6-main/Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
XWorm-5.6-main/Plugins/FileManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
XWorm-5.6-main/Plugins/FileManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
XWorm-5.6-main/Plugins/FilesSearcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
XWorm-5.6-main/Plugins/FilesSearcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
XWorm-5.6-main/Plugins/HBrowser.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
XWorm-5.6-main/Plugins/HBrowser.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
XWorm-5.6-main/Plugins/HRDP.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
XWorm-5.6-main/Plugins/HRDP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
XWorm-5.6-main/Plugins/HVNC.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
XWorm-5.6-main/Plugins/HVNC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
XWorm-5.6-main/Plugins/HVNCMemory.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
XWorm-5.6-main/Plugins/HVNCMemory.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
XWorm-5.6-main/Plugins/HiddenApps.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
XWorm-5.6-main/Plugins/HiddenApps.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
XWorm-5.6-main/Plugins/Informations.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
XWorm-5.6-main/Plugins/Informations.dll
Resource
win10v2004-20241007-en
General
-
Target
XWorm-5.6-main.zip
-
Size
25.1MB
-
MD5
95c1c4a3673071e05814af8b2a138be4
-
SHA1
4c08b79195e0ff13b63cfb0e815a09dc426ac340
-
SHA256
7c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27
-
SHA512
339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd
-
SSDEEP
786432:Ty5jMDNnx2+4NYobtH8VVtKqi9+i514XZ/pjYlp0:MMDNnxV4iobxibiIi5MpjYv0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 51 camo.githubusercontent.com 52 camo.githubusercontent.com 53 camo.githubusercontent.com 54 camo.githubusercontent.com 55 camo.githubusercontent.com 56 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2820 2760 chrome.exe 31 PID 2760 wrote to memory of 2820 2760 chrome.exe 31 PID 2760 wrote to memory of 2820 2760 chrome.exe 31 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2660 2760 chrome.exe 33 PID 2760 wrote to memory of 2844 2760 chrome.exe 34 PID 2760 wrote to memory of 2844 2760 chrome.exe 34 PID 2760 wrote to memory of 2844 2760 chrome.exe 34 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35 PID 2760 wrote to memory of 2608 2760 chrome.exe 35
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main.zip1⤵PID:2808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb1e9758,0x7fefb1e9768,0x7fefb1e97782⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:22⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1504 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:22⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3216 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3960 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3888 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3744 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3740 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3900 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2328 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3856 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1596 --field-trial-handle=1388,i,2020819703583340659,1736378166367200527,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2084
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:748
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8029ee08bbf9b4375adb4d085ff7690
SHA168d4ee2ceecc4687be96a0a09a48a49298a8db90
SHA25646b3a397afbe34378b33e92e439646062b30a4b0a417c96824c3ba60b56c65df
SHA512444cf02a139f7ffe553850ef14dcd2624b5f2cdc1486aaaf48c89788319b35470245ea442c68a846090b69fe1ee08b273ddcb9331a19b06435b5b166c5af8aac
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD54b5c499720c846972e0c38b601ff9ab7
SHA1b5260b0ee62bdede56f69c3d64afa2b49321856d
SHA256304b6def83a9ee3cf3d308fbd947f7d2115da2cb7caccfbc383e0842bda229d1
SHA5122a678964be7a5eec9efd9ab6cb90dfb6728b76557f2bd6e98f3d7341338e56f734a0a07765692f97d1d0893192fe77e557d880af4f5739990c8200275da37479
-
Filesize
363B
MD5f84ae2e4c70adcc98d2cd0c78c9a92c4
SHA1044776c8a5844c0ef4ee1077e08ac2a04bc5847f
SHA256e6ab80c0f1f010276ef3da0068e2af434b732bef2bb555b54f708fc49eeeb406
SHA5129b228c6e82d26870285f23530006c3126fba4328e865f807a555211210ceb7a6189b690a636620887b81f22729e101c2f864b4ee42255acedc11a725e56add52
-
Filesize
690B
MD563cbe8fcf076d4b000bc8e79eb4d7444
SHA1f02631a1f7524b95eaddc666cfd39e52970adcc5
SHA256f776f38e5f1c471b3945eab12454ab342ab1a7d9ab477f04209cae936eb9a301
SHA5125e8ea73c3a00006bdfdf096086a83cadbe05859ecf8fc1b88e891031365186099e0b4d7de68243bdba7f16f1cea28dde409f38a0fb25d9bf2f3d7663bc4237e7
-
Filesize
363B
MD52aca17f17dd07ddb8c29d65b6de02d04
SHA17d4188f1b9a3250f4b8d505331f99c067308fc11
SHA256c909c375fe272223b6fff8527b7d2584a078c68fc13016f73d01e516a0c99e1a
SHA512d7ba54f7493188093c33659585aa970ff1efa549509438f521239263f2866819c01d0d0c009bf5f4b4307d924e99355bc8652ab6ff4759d4d9d5b6bbda5a016d
-
Filesize
853B
MD50fbb133c8e83eb421dad1925d71dfb6e
SHA12c71adf8e03f454c65a3fa735b7e7434b436faf3
SHA256260e457bc78ee97ab97fd06b234025c353d6f999e721276642ebe4456bd2446f
SHA512d4346240fad8e93676f74a750656e5cd545078e69a24eae679dc4214d08faa9f01c93d6bc8b714ffd637975d0bbcf5d3d8cc55c74a5794d7c54c81872a7ac70f
-
Filesize
363B
MD5f50ce208656b0030969ad6117add74c1
SHA16c76755479f474569535b43275a5d5db7ce7d148
SHA256a3f935efbe4e6f686f0201913fe58dccbe693f0d5096edb6a2811754fbc19e95
SHA512a8035a664c744cd5304284db81f83d41c13e934be52d4e51d3dbad3f7d08b6a52aaad14e019e363c45d9ce820b60b7c05a19c49ba07a1657250bcac40ccf2820
-
Filesize
1017B
MD58e445022a48ac1018b8ee5bf04674b99
SHA16b354bc988915d8eb227f64796c6f46bffbca0b3
SHA256e1a135839bfb15977218ce0bb101dbffd1a104b2ce6d3793ad0bf9c9d8bc2d8c
SHA51297c653f484376db1d8a51b7c4cf163c42472fa49b115d5c433066c11fb1bd863574d69c98afa90296d7ee6d8b5bc99fea965d60d39cd05a388fd6e2022f84d34
-
Filesize
5KB
MD5681cf05c47581882c4daeb63f8400ae0
SHA15b5cb649d414b68324ade12e314802d764b1b7c3
SHA25631134ac8625becb0def4e3e7d143f406c305f1292adaf228c153a07d6b2d7bac
SHA512ba04d8a4edb26fddaa1549b259f163a4b3dc4cd34f41d22c296d20fbd7631b1927c21dc3d0f14647ce35f8af2716f949e5a2bb969997e7917d136325c833ff59
-
Filesize
5KB
MD56cf64f50b5ece554202aaebc348f6cf9
SHA182bb33f564466b63f9f9f252bf1bac46904646f5
SHA256824c9aa2e718b0dd3487f81e5e6eb2381315446161a5e415a432543205eeb23e
SHA51224807fb20758c85865e82bcdaf649d912d5600bc31004750960e8be452a0b808831be7cd7739b9b1fe6671e5bc2b5f91d30fa7c50b8baa8225029aef3504bdab
-
Filesize
5KB
MD54cf1a64638ef133dc840b883cb5cdc53
SHA1ad464748a0ceb82ff96b1a92cfd20f6fed7da554
SHA256fa347189d7130c16a9fb8bdccdea0d7bea6e9e9098c4ae69b739daf6ba72d690
SHA512e9857443b34e64a6a9a9b55a8d96870f3e1a93f7da76c055ba363b0d84c9884edb70063ccb7046bf2c7babe3f5a8f3498b0a3667853ace9fb32fe4469882e557
-
Filesize
4KB
MD57e532e89c206e4b47626c055187a00d3
SHA166e6396c0ace05cc4983fa3ed7863cc0f27e4c3f
SHA256fe3da3c853c90c51139f2963b33357257736bd8452c39e283d5c8e676e785318
SHA5128f0c226ea6b9904571c4a5bee04be503d904aff4cb8447eafaecf33f1ada3a76ba90148ca28ec27728489caf560a64899caad4de79e7920189907185f8960806
-
Filesize
5KB
MD5efc55437788540558e3ad2d8f57b5b89
SHA14cb7fad83f08d26fd0cf19a57ac52224f9a52b05
SHA2560f996871b2a20c2f79c984b1ed71226fbcad7540fc5824b350d12be88b7db821
SHA5125bdcb244a77ca8994cfe843d2f9146c0e3f7a9fec46b0e15da4a3077052f3d80cbdb2a7931379cf3a6bb5cee84a068be39025f8dc3edc9aa8fabcf1a85a01063
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
341KB
MD5fa219c913106e3628b4b088120e32820
SHA1086de9014fd771af05c6573c2c30029863576288
SHA256092697529ab7b05d702e221656be4ad1507ab4e1b2d1c067ffb9a203cab1f915
SHA51292c531cf828572c2c0ef168c461decab7fb0603ca30c6bc2fe43193084a148544b84c589865b1c4e08f5a67ac2d61494abbf6868c2f29971fbfb8728c79ea011
-
Filesize
75KB
MD57dbfbaf4fd28c72d8abce7c3cd5c8797
SHA1534db807d848b6c74bf9ed3bb4008f4190cea248
SHA2562536b068f1489ff00f2153df3264eccbdcccc8bbec1a91947dc91357d840b8e4
SHA5124237b34f43c931ae15681aae7704b2634cd167c74b75448373afb7f6e9c6e0b303aab33aa2f18f6cf8a928b636bc26dff2a35d45d554fe61b14a12b888716409
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
25.1MB
MD595c1c4a3673071e05814af8b2a138be4
SHA14c08b79195e0ff13b63cfb0e815a09dc426ac340
SHA2567c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27
SHA512339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd