Overview
overview
10Static
static
10NAudio.dll
windows7-x64
6NAudio.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Plugins/Ac...ws.dll
windows7-x64
1Plugins/Ac...ws.dll
windows10-2004-x64
1Plugins/Chat.dll
windows7-x64
1Plugins/Chat.dll
windows10-2004-x64
1Plugins/Chromium.dll
windows7-x64
1Plugins/Chromium.dll
windows10-2004-x64
1Plugins/Clipboard.dll
windows7-x64
1Plugins/Clipboard.dll
windows10-2004-x64
1Plugins/Cm...ss.dll
windows7-x64
1Plugins/Cm...ss.dll
windows10-2004-x64
1Plugins/Fi...er.dll
windows7-x64
1Plugins/Fi...er.dll
windows10-2004-x64
1Plugins/Fi...er.dll
windows7-x64
1Plugins/Fi...er.dll
windows10-2004-x64
1Plugins/HBrowser.dll
windows7-x64
1Plugins/HBrowser.dll
windows10-2004-x64
1Plugins/HRDP.dll
windows7-x64
1Plugins/HRDP.dll
windows10-2004-x64
1Plugins/HVNC.dll
windows7-x64
1Plugins/HVNC.dll
windows10-2004-x64
1Plugins/HV...ry.dll
windows7-x64
1Plugins/HV...ry.dll
windows10-2004-x64
1Plugins/Hi...ps.dll
windows7-x64
1Plugins/Hi...ps.dll
windows10-2004-x64
1Plugins/In...ns.dll
windows7-x64
1Plugins/In...ns.dll
windows10-2004-x64
1Plugins/Keylogger.dll
windows7-x64
1Plugins/Keylogger.dll
windows10-2004-x64
1Resubmissions
26-11-2024 18:46
241126-xerrfstpbw 1026-11-2024 18:25
241126-w2kqzstjfv 1026-11-2024 17:52
241126-wfxhnasjg1 1026-11-2024 17:10
241126-vppczazrbt 1026-11-2024 17:06
241126-vmjdyawrbl 1026-11-2024 16:26
241126-txkt3sypey 1026-11-2024 16:16
241126-tqy35avndk 1005-05-2024 07:02
240505-ht3d6sae8s 10Analysis
-
max time kernel
105s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 16:16
Behavioral task
behavioral1
Sample
NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Newtonsoft.Json.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Plugins/ActiveWindows.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Plugins/ActiveWindows.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Plugins/Chat.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Plugins/Chat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Plugins/Chromium.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Plugins/Chromium.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Plugins/Clipboard.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Plugins/Clipboard.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Plugins/Cmstp-Bypass.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Plugins/Cmstp-Bypass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Plugins/FileManager.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Plugins/FileManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Plugins/FilesSearcher.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Plugins/FilesSearcher.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Plugins/HBrowser.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Plugins/HBrowser.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Plugins/HRDP.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Plugins/HRDP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Plugins/HVNC.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Plugins/HVNC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Plugins/HVNCMemory.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Plugins/HVNCMemory.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Plugins/HiddenApps.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Plugins/HiddenApps.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Plugins/Informations.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Plugins/Informations.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Plugins/Keylogger.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Plugins/Keylogger.dll
Resource
win10v2004-20241007-en
General
-
Target
NAudio.dll
-
Size
502KB
-
MD5
3b87d1363a45ce9368e9baec32c69466
-
SHA1
70a9f4df01d17060ec17df9528fca7026cc42935
-
SHA256
81b3f1dc3f1eac9762b8a292751a44b64b87d0d4c3982debfdd2621012186451
-
SHA512
1f07d3b041763b4bc31f6bd7b181deb8d34ff66ec666193932ffc460371adbcd4451483a99009b9b0b71f3864ed5c15c6c3b3777fabeb76f9918c726c35eb7d7
-
SSDEEP
6144:96/i10SZtfzWctj98vZcE0wmLlaIZs5eku2sX2hrjAzvgmXa6W9FwsT9idwktQZG:9yrSKMJR9aGs55T1X9Fwspi2tGpmS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 34 discord.com 35 discord.com 36 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: 33 2984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2984 AUDIODG.EXE Token: 33 2984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2984 AUDIODG.EXE Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 284 2804 chrome.exe 35 PID 2804 wrote to memory of 284 2804 chrome.exe 35 PID 2804 wrote to memory of 284 2804 chrome.exe 35 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 1900 2804 chrome.exe 37 PID 2804 wrote to memory of 2388 2804 chrome.exe 38 PID 2804 wrote to memory of 2388 2804 chrome.exe 38 PID 2804 wrote to memory of 2388 2804 chrome.exe 38 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39 PID 2804 wrote to memory of 1468 2804 chrome.exe 39
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NAudio.dll,#11⤵PID:296
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:620
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x46c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6369758,0x7fef6369768,0x7fef63697782⤵PID:284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:22⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1576 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2144 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2156 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1428 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:22⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1500 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3716 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2552 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3772 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3824 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3972 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2056 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2348 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4172 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4332 --field-trial-handle=1004,i,118227967167887488,8010345966421526191,131072 /prefetch:12⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515248095556c0bff65ed503aa72dd27
SHA1957a4754e1d57a8ae6a79ca16939b66625dd905d
SHA256fbae1236c4d452990579480c6d3b4e8c7f99ea652dcf6bfddec30abcd7f1ad6d
SHA51278cdb382699780413c1a5e4e192ec556b9b494138ff8ace5df8a7adb9f5596317095761c547ff4cb4c525803d2f9dcc553e8fa4ab0da6dfde6940ecac442acdc
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5a2865a960b1cc02b573b3dd8c17de9a0
SHA1a29abd972a32d33436c709d89dd1eb7ebd98a728
SHA256299f81b21d404ccdac01e10b250191142c2d8bb3217fb4c418ddbfeacaa01248
SHA51269489751064c47d04d2e059922223e5c23b8e93cb9a6d8d9552b0308f6e46cf65833524638f03a5c04c3bb9caa964b400ef15680a8a02959b80aa6f0e7f661a8
-
Filesize
361B
MD5a0fa28255affca2610d1ade57ee34aa4
SHA181b8a7aa9d7a12ffad5d6c60ad8ccfe2596edb85
SHA256c6fe80ad04d244c10e0161c6193987008e865ee4eafeefc3b6819e5a0f9d02eb
SHA5127d175f79f51e55663edc35351592b0c646b0a0c341009c1824b8377a39a6850ae0668e70b23b537811744ca9be969ce72c74bd318171e27a6cc65f9de778d88a
-
Filesize
361B
MD54acc6f241723a2708fea911e67ff1365
SHA16c2da237a7620849ca212271c7bf3fe2abd50ebb
SHA25629fda415163124cc2bd6c4ecfe6dc532a20cb2fff57042c34e2849ece9e33615
SHA51224c1466efb75a39e38e4670a2bfe30437a52ef9f6395184e7f7ea999b9023d339eb66eb488fa6017b11fc193d46c3e5c1b4fd80887205e8721739ee6de962d94
-
Filesize
6KB
MD5082b3cf8fc48236fec7bcb688fcb6416
SHA12e81d91f0b66a0ca13e611eb2cf9ff03a69c5d19
SHA2563693d1318738ef570505cfbaf4eaf77566871c840b98982993c6e9a2f18130a6
SHA512b16dd4cddf8e370f0a84adc3f3d7a7a53bb03f2fb66689e6ec4243979ce56d8fd2e25982b3308217e0864f8ab71e4ee3c7bab4ca323041cee66bed2988d540db
-
Filesize
6KB
MD5c897d1d2ab6d431abc5d672b43134b4d
SHA1a8f18daf801b509ddd1d7c70ac7c9eac09f11c71
SHA256c4b00c2de3739340f5cf9b44fcde43065c5a5c7e89b433bfdce4b44d24a6db0c
SHA512ac9b0194a1ccca62fbcfd97e0d6131b2f667d47a6846e8b31d4ab46f23301c1a3297175e78c5f8082683291d745fe35c1ae75847c758452fff0b870c0f3c2c8e
-
Filesize
5KB
MD5ebb72a209516b297d7b4086812344f63
SHA11ccb2d90bd05467da9b5538a317ef40c7c0da7f7
SHA2566c52ccd3082219566ff99fa8a657586902af8d54c06df920958eaa582f9a56b9
SHA512e7bf9a8b5354fabc41c58dbffd0ea5779418453497587d5b0d3d21363f44b53e4f42bfefb9b6b0a2258a16e69b050ee16aea5f00012ef71c3445df8c7c59962f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
349KB
MD5e2c4d9c16301ee1aa48337017f3b29c4
SHA138b630fbb6e0caf18f60f5f62920eed6ce162fdf
SHA2565e93ad5d4a073939317a136d5c4bf0e5e215e3b95b1eee671bad1c1fd6166e2f
SHA51212df10a23027db1f6e61cc5267e9c2fead4e2e9908782a830c2922c30eb34356e04241b6cd1ffdcb244c9c1a94fa20102457c079864d64c45a0718069a8e4f10
-
Filesize
170KB
MD59a8db5f410da111060e334e8a1e8ba20
SHA16d725e6a18ee19558fc8b0637370849c87fed4e7
SHA2560140a0583a6522856e43bc92f23da65e463c9f769c40e7e47c87bba0ce602551
SHA512e4ff3522714a9144d38c0a198dd488adbfaff71ee87d02ce4a46908245b5f6bd02b08833f1dc5aa2d5fb4ae2938ec94adb7ef09f0c54a2327bd63a1a13528c7d
-
Filesize
349KB
MD54be10d09bf62c70a017be8188675181d
SHA14889197f735bcfe3a2d5c98028bee1bb9ae35cc7
SHA25656372460b86b20449af1538b8e324518729882c23aaa08a8647b8cd2b319a47e
SHA51239a78e7fd5fc53f1855ff967da116ef8a8b2db0a20fc267d9c2aaae02fcd122dc4eab61ff02a8a95c8ac40d93e6d5e2e1ed0cc0a51061cb77597009e4bf39a78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b