Analysis
-
max time kernel
117s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 03:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sogousrf.com
Resource
win10v2004-20241007-en
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1528-13280-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral1/memory/1528-13289-0x0000000000400000-0x0000000001F8C000-memory.dmp purplefox_rootkit behavioral1/memory/7676-26433-0x0000000000400000-0x0000000001F8C000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1528-13280-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral1/memory/1528-13289-0x0000000000400000-0x0000000001F8C000-memory.dmp family_gh0strat behavioral1/memory/7676-26433-0x0000000000400000-0x0000000001F8C000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Executes dropped EXE 1 IoCs
pid Process 3436 sogou_pinyin_guanwang.exe -
resource yara_rule behavioral1/memory/2464-13298-0x0000000000400000-0x00000000006DD000-memory.dmp upx behavioral1/memory/2464-26434-0x0000000000400000-0x00000000006DD000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sogou_pinyin_guanwang.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 62072 PING.EXE 27920 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133768056155349293" chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 62072 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 2152 4512 chrome.exe 82 PID 4512 wrote to memory of 2152 4512 chrome.exe 82 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 4936 4512 chrome.exe 83 PID 4512 wrote to memory of 2164 4512 chrome.exe 84 PID 4512 wrote to memory of 2164 4512 chrome.exe 84 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85 PID 4512 wrote to memory of 3192 4512 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://sogousrf.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd1ad1cc40,0x7ffd1ad1cc4c,0x7ffd1ad1cc582⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2008,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2384 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3024,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3032,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3296,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3364 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4656,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5292,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5264,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5400,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4976,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4536
-
-
C:\Users\Admin\Downloads\sogou_pinyin_guanwang.exe"C:\Users\Admin\Downloads\sogou_pinyin_guanwang.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\cswcgosb.exe"C:\Users\Admin\AppData\Local\Temp\cswcgosb.exe"3⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\cswcgosb.exe > nul4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:27920 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:62072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sogou_pinyin_guanwang.exe"C:\Users\Admin\AppData\Local\Temp\sogou_pinyin_guanwang.exe"3⤵PID:2464
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4916,i,3236144575482737798,721897192182633735,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:16244
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4492
-
C:\Windows\SysWOW64\Tlctl.exeC:\Windows\SysWOW64\Tlctl.exe -auto1⤵PID:7676
-
C:\Windows\SysWOW64\Tlctl.exeC:\Windows\SysWOW64\Tlctl.exe -acsi2⤵PID:27928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5453180f9ee04b77bdf27058db9a17505
SHA1c1a64187444627e5b812493dbb8d634e36542ee0
SHA256855b3b6cc243c4680f49d98d66f721015119f8d6d345a3d64bd387fdc9cfa524
SHA512e60840f72d395b137d5706119aff0c7e3fed6e02c2831dd4dde7c07c48a5690db92ca8843b2cf0093d93968b865001ed75bb65f46ec70d9e3a2e5e6eb8434d24
-
Filesize
120B
MD5384e22db5790c8f2360d5a51b82eb323
SHA1b8d6c14a5ba056e57b9b75b22f86a35ab0bfd0bb
SHA256c210f5de5929345c7c23590e3b75ad0e91d269b6a32927fd63fae3daaeaa3e30
SHA5123a39c5759009720d3b8d2e190b13eece30dcc1b18e7b6393810ba651cbc4cdfc1c4c65509ed4000829f3fece0e9cb6ef602589a3cd6cb654d37f0e691b42bf60
-
Filesize
3KB
MD5f80d0613424e19b0b041ba660d0a9a1c
SHA1f269b96d905ac40745818d5cd65452b6f8fcd40d
SHA256574bb7f7f9106239a4af6b26483ad70ae80fa0ebf150498ed89545e8fcad1f26
SHA5120ee90ec608af3e2b676c467bf1d6ae62a702cf5fb70d5405747ad67f7d8614c1d645fe47430a8cebf16ed84386b9cb931dbc820b98089c274017744546331624
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5746cf1938441e0cdfaae8f4ac45f7b39
SHA1781044915843757e45f4c25fc29df5506d360627
SHA256abc4a2dd7f83e4461d5b494c1ad17836cdb142c5f6d5f911eeb07da3abd12f89
SHA51243d34cc91899362417736936b958245b80c7ea1eec13a3ae10ba83f29ea51df4a3ee4c918c9945a8b22fabe671a34dd247aa217a4508b646dd1054156ec6a2a0
-
Filesize
9KB
MD51f79c3f895f9e6a2c40c5af34ce0c117
SHA111ef74676142fcda7945ca544582e1d6ea5a7f0a
SHA256ff7cd2aad10d4543b1548b59880961871081aa1bdea9ee9b7db1f608ec88f97e
SHA512a7e28ed097fdf469a8512352e107bb516fa703866eac1ab5383aa63b8b8c354476cd5d76340528b88738e6f27b21f7f622b9cfa79177787b1058c37a76dfcd6b
-
Filesize
9KB
MD507f8ecca94bca008dd670b07c0aece73
SHA15b6305fb93eb8afca72f1f03f75a38fc421316b4
SHA2568f1632085323d2d9e39eafcafbd582be781fe5bf60c5b12837751804fe8fbe20
SHA5120af1dbb60b9fc505215c52b91747d1058d68eff63087c812178d5412a3c07fd125bd0d5f3551bad97b20cf2c69a0713a4506669c3803375c0b6c291fca712e88
-
Filesize
9KB
MD508324934a873fd8cd11dc009e57bf1d3
SHA12136b9c966221007a15e296ce4e1a4c198ab2d64
SHA2561dbb9d47337a4e78b8c5da7c31293680118a9d603121f05f4a2784a576ec87a3
SHA512da3164c297dc2bf5dd76be1d17941720aab2f5637d26bf5ea748e38b1d3a98614ea46c89b09bdd98e032da0ad3b4898bfee90289d572e7c4d59315eb2f42617b
-
Filesize
9KB
MD5ecfe989e0a7d983283cfa2732be68686
SHA1438e97d569f786b204de7e3d60dc0ab156f8a5bc
SHA2560bb7f00223b13b21d6ff651d0098ec4717b4ed47d519e8678f6a6c55961e4e61
SHA512cc58db4e9f55f1b053fac0f1cfc0d3730988346a3bb2db23e4669389f1407ae48b50e0efb1496621b90e2c403eaa516d61a43832a023d46d0e53acdf637e0ee1
-
Filesize
9KB
MD55b213283ff3d2cd16fd6f11a1378715a
SHA12db623813ae947e690e78519661666f152b821f7
SHA25675366d35580c80ad8e1f35b1b95180e10edbbbbf065142b412743eb464b7febe
SHA5125f5170d68c24a5d45d2a67691ae1f2b93058602dc8fbc8bb78963432ec07770439600668574845822a2445b9ef51d7b25167edad4a1c48ac521fe1fec4237bb8
-
Filesize
9KB
MD50c8a8b293fac409cc6c8204cbc228dbe
SHA11b0c1eaff3b0bcf4bdeb1237707200bea751dbf8
SHA2568727d9bee2a9efdf041cc99a6685f810d92e0d0f400739d1d9a4a8eb77bb697c
SHA512745c48172fb63c0f57ddb9ae73a0c1c1344ac5a48a14a178e71d210aa0c932093df2a17c366a7518afe232f1e52c1183b6265c12e29b99a9bdd2daa58227259a
-
Filesize
9KB
MD5beb8227a83a215e01650c5f6200a322f
SHA18985d29094157bfdc89507e96e9460070706719a
SHA256d835861ed8680cda43a147991ba7f319c90450599a1778c45d42f72b6f93f41c
SHA51256f280b4effa5f0d72b3eb531bff565a8f038cc30c43b2d9ba0a7e49bfec85819bf2b302b57fbc2a043399db483757b23e5708f4dc954647d4b55be2bab1d262
-
Filesize
9KB
MD54e6b6675fd7a5eb08dcbdd6c36769cef
SHA12eb7568d63e8707709ffa0e4fa5220f68b7f4cfd
SHA256ee251c3b49389ce8203fae2f323f9f869ba7d8b8f48f7afd581b9c9f308201e9
SHA512c245fcf3eb9c437166b9d4238350744c48591915d61016da98c00c4b0d27d9645226d548e7f010d16c48fbba827b1dce73fbfd6660ba0b3c32c36b333e34291d
-
Filesize
9KB
MD5eb87c84a025bdc6426d288c719857515
SHA1354c4bd61702ce9d1b7fc61cd96afea734b94d00
SHA256e8d7c587bc59443deee0a412cb3cb7fd96d2b2f432622576d45a5821b058ca58
SHA512d03bc223fba82c29c3508e59e16226c1de55d2b6ff400270d2a16de45591ade139768680e4c07de26741b1653c71ed667e1f1e393db5fe1490c6abed50b42f81
-
Filesize
115KB
MD58202b3490b334b0234cc77840e647dfc
SHA1887cc1e0a49e1ce7adab1beaa84b3e9670d7a428
SHA256b1f31cf2efe8df40567290aba9f3c357fb8f1f9a867fd6f2a618d0bec088da9f
SHA512d3309ced69f6df357cc5a4e57dfee01c6794e8225da903ad1e35374dd68334d86dacaf254bac424f261c27b1b7b939db2dc30ab7bf6e8d031e5778eaa66e38e7
-
Filesize
115KB
MD5eeb162988cac4418fdc48115919b6e20
SHA158872cf1748b5aa8bd54b84d5ccb3290cb114a3d
SHA256fc6f4fdfd6d490fd9e230de40b3034619bd98643d4cdefaa0cfaa3abcffee205
SHA5123d1a4a3f4a122d5ae312f909569dede5d12184e2eb510b66cb97dfb15753b6ebc572407b534f2d848fee373f5983de99146374368df387a3847ac8c320e43175
-
Filesize
115KB
MD5332bafeab8d8714000ce58bd29f99f1b
SHA17e266ac76d110c4c4c057fa7bbc2f56a198b657f
SHA25669a28412610bcf688c8083afea493add5f793efaf1f4918ea2a9234784de2931
SHA512c824900bfbe127929fac9344b7124439623c5ac9321f9e1b768253ba47dbf4a2c2bfbf4c0d893dc072f315334c1c6096d064f8bd8ce5595d6539b80e6f17e1a4
-
Filesize
115KB
MD5cac01ed69e811b02513a46f370639128
SHA1a75e4d29d43364741d3184cfc4382737cadc8fbc
SHA2568213eb7452bbdae6d94f2467835f60cb8c0f728ee8b49bf5e3d4a38209bfc495
SHA5124cfc4a924541e94f103875bcaba78e9376ce4387f4fbbdeb2d5a586758a5750aada1c8a37ccf9acb9d5965a4c4bfa7707daca9948bce8319855d61022ecb4ddb
-
Filesize
100KB
MD54c6426ac7ef186464ecbb0d81cbfcb1e
SHA15a6918eebd9d635e8f632e3ef34e3792b1b5ec13
SHA256f627ca4c2c322f15db26152df306bd4f983f0146409b81a4341b9b340c365a16
SHA5125f6dbea410beee80292b16df6fcc767ae6baf058ab4c38fa6a4fc72b7828374af42bd6da094eada2ad006d1a0754f9ff7bdd94c0ef9540e6651729b74fb9ea46
-
Filesize
27.5MB
MD5fc7f52ba7722c4beecbc550e6376a53f
SHA148649e85ae0181dee896cfa40369d8887bb0fb49
SHA2567c3763106ba7b5f96ee7fc4411278737db191faf19bd0d5fd3cc4cc63f3f110a
SHA512a401e6d587e25ac24fb47dce47468eb24250edaf5477d21d6eea7d7b8881916273034705d346519d530d61927ae80ce347d26852e71a89bb62b47747a6408c92
-
Filesize
25.8MB
MD582cafea5780099060dddf0c7fad89f6e
SHA19cb85ca01a86c43dcec5e49d47d2986c66511de8
SHA256511d7de0b3de8aa904e6e18e83cc7e1960c4a6b1af4ce64fd88d1168b5d97448
SHA51201e4009810e85c40d85051f7053284b73937df16a8b94283f5789b53d2469de1c00f96a1ada79274d569582f5ad0338bc8a7bf0c0df9d57ac245b9f5f59f6972
-
Filesize
24.8MB
MD5f2350dbdeb366f34e81ae85db6958a9d
SHA1cf9a892222671dbbdc78304b50738b1b6a7634fb
SHA256347b8e6834dfacfb07448be3c2f266e6b363ee3b447f2d33bbb8c1de18fc3763
SHA512a70c20c586e2c39083cd7df90eeef5713f413f8d4cc92b0fe2ff63630fd698ae31028fdff8c5e2b5c593fa75c37c80b3abe9b9bc9d8c8aa69653ced39e2c1e10
-
Filesize
138KB
MD5dd02068ec46551327bf262153566f01b
SHA16ce1f9da6a5bcf58701c5f0fb48e1f35b7c340a5
SHA25612244da2b6218993def3bac6f014da74722e41982a92df5fe3c5be477c861bb6
SHA5128c9e22ff273e6f0cd0a98a348edc04eb9421c12583791850f38b81a04361ee27829140975022b4d38340a00c0bcf16f132929db0a0748cfebfd8a01ab9305f9b
-
Filesize
5.9MB
MD5657ba46e4ff84fac76d64db09f012e88
SHA120d7000a6e0a4320728edca77c49ba2f9077da8e
SHA256ba67d8f34a6841c45dfa3b332cfb95ab8a4da36c38aa33b00f61abce3003728a
SHA5124468c3518da96f935780147e34075ff8a81eb624153ef138908b9c35e7a970c0182dc0eda78259a7286a43a62b6a4fc7d80853694b3f873b6ed265abad586475
-
Filesize
6.0MB
MD55cdbeaa1ec6ca473b81fa2a1bfdda1e6
SHA1c02999534067cea8c5bdf490808dc03f71e36a53
SHA256178c9d2d567d843983bc068d51a6125d64cf6523ac197f67a1a5b7b04cf6d602
SHA512ef6e7201370f5d4ba379a8bacc36596cc05c0a3f052e4b42cc3cffc6a8d482ac25739aaf26b48a7c971281327bfec712f202717c85636b27a4eb8cdfb79b9c1c
-
Filesize
3.9MB
MD5c183621f005a01d453d30b68790e8319
SHA1546ba974e936f172162941fb21cc2b110d2a5c0f
SHA2567633010a0eae5361c96cf7c62bc420fd5b615431129ff606a595da6df7eb66c2
SHA5122a22e6db6d70d189b23a0692e70d829eee02cf82bd83cd8e2a0779ec62843053e55c7d6c95fd5508bdd61d7db1e1bb423ad0a79f6fb3a593d6272c8f2a0afb91
-
Filesize
11KB
MD5c51fc979c1c3e17bece7bd194aeb6ea2
SHA19a5d000d6393f2980062b4cc6e8f543493b1be8f
SHA25693a8e95708882e56250ae55aef93417333b2dbe7ea99590abed34cdca2227e61
SHA512716cdeb890307ff42901464dd24aa94e29415ef20d4e975c2733e34330fdf85edfd4ad9e00878edbe98921deebe44153279cb95acb309c5e1812026716dcdc4e
-
Filesize
19.6MB
MD50e025c41471cd3ea771864121ea52109
SHA1ae414ec6c5526156418bf2a7033402209d08af1f
SHA256c038d9d2cdd720ff3b7a242d1f37ced9db2d15f8237b2dee7dc53b587eac3522
SHA512d947fe1d6eadb0e0bbf7c4b9759226c63aa2bad270fc565e549fcaab0e975b4330fb011a03ef970fdc9e2bce04300b3ef3d2a0cc1f7737d223dc00e9e7d11714
-
Filesize
19.8MB
MD5fa9f63320a9f2db91e255f795ac6beec
SHA12ccbbf63ef654fa1ba9297f8e115837a3eaf3d88
SHA256d2b8822c117eac357c9af66820dde7bd86c0dc3929282f59d8a62b952cb615f5
SHA512ecde40318d5bc59e8039cae7d1778753bb7ed0e498dde5b658a66c9365d574521828d8112274690a2daaa66c80ec6ce25e410d3cb2185e28c9b0d68eed2da43a
-
Filesize
18.2MB
MD53a55805bdd5e66758644706f80a7f2e5
SHA13502634ded5f8bc1d4147635ea706803d1078c62
SHA25607a6b001f5bc6b92fe2adb675c4647c585667d240ecf6147cdd21f7569050d1a
SHA512fb7b17ae8f0d717ed95d8727e7f5b7f05e7172ac50863de9af4a31a5049325759ee2592d120a1ee83de0aeeda1d2ba00295926f2662dec5645f60020fa09e421