Analysis
-
max time kernel
126s -
max time network
357s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 13:32
Static task
static1
General
-
Target
dog.jpg
-
Size
5KB
-
MD5
9535f14c249d78adce4b3aaea2840453
-
SHA1
816dae2bb35a8c44078ac77b557a8f32e85c7cc1
-
SHA256
01ae86e82b5ea6a04ac3d390585ddaa2d639d605785c01d4c3381c16a42acb10
-
SHA512
46dba79957d2b8d23005580be926b5703464c57017e19dcddb6a31d2fc4129f46d9078915ca96899b03c2c91f33b17b7829e2787e04cb521ea2d308d5573736b
-
SSDEEP
96:konLe3wfxJ3znYWrOFIyaXi/Ky/p8USrfr3BsixUD68ybD:hLe3E6paXty/6LD3Bsixm68ybD
Malware Config
Signatures
-
Detects Eternity stealer 3 IoCs
resource yara_rule behavioral1/files/0x000500000001c8c8-567.dat eternity_stealer behavioral1/memory/2908-576-0x0000000000DC0000-0x0000000000EA6000-memory.dmp eternity_stealer behavioral1/memory/2472-601-0x00000000011B0000-0x0000000001296000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2112 rundll32.exe 2112 rundll32.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2800 2728 chrome.exe 31 PID 2728 wrote to memory of 2800 2728 chrome.exe 31 PID 2728 wrote to memory of 2800 2728 chrome.exe 31 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 2652 2728 chrome.exe 33 PID 2728 wrote to memory of 1660 2728 chrome.exe 34 PID 2728 wrote to memory of 1660 2728 chrome.exe 34 PID 2728 wrote to memory of 1660 2728 chrome.exe 34 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35 PID 2728 wrote to memory of 2624 2728 chrome.exe 35
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\dog.jpg1⤵
- Suspicious use of FindShellTrayWindow
PID:2112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef78f9758,0x7fef78f9768,0x7fef78f97782⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=284 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1820 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:22⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2788 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1172 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3248 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2028 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3888 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1056 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3880 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3228 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=904 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2620 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3832 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2044 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=872 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1136 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3876 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=2984 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3712 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3880 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 --field-trial-handle=1288,i,9794991458469298092,8095770756090703482,131072 /prefetch:82⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2540
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1d81⤵PID:2116
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Project Eternity\" -spe -an -ai#7zMap7482:90:7zEvent10801⤵PID:2680
-
C:\Users\Admin\Desktop\Project Eternity\Eternity.exe"C:\Users\Admin\Desktop\Project Eternity\Eternity.exe"1⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:596
-
-
C:\Users\Admin\Desktop\Project Eternity\Eternity.exe"C:\Users\Admin\Desktop\Project Eternity\Eternity.exe"1⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:1920
-
-
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"1⤵PID:2460
-
C:\Users\Admin\Desktop\Project Eternity\Eternity.exe"C:\Users\Admin\Desktop\Project Eternity\Eternity.exe"1⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c077233ac6fde82416df7965bf74cb76
SHA172de8e673559865d0a8574288f1b9bb04f55a37b
SHA256f40f8f55755e4daa17cab95c04ec838d1985e2db660a1e073c5bf50f43bbe597
SHA5125161d75e50ddda48eab8fa4b9fe65dc623480caca7230404764b02c60e340f1caae44a114fdab48fb521cc60e6e2f5ae32e6743a0c972b8eac65ad34874c896e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\Origins\CURRENT~RFf7b1a06.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
1KB
MD576bead315136029c42fe537ddcbc48f0
SHA1bda53114110cc8eda5ab9b9a19cbc019bc0cb8d2
SHA256241b7be592f49ed22e4646a3a7f239aadcd824d5449fb16b153538ef196a8fb5
SHA512b00ce4dca30216ec35f7f4e6aabf6a656801281ac5c5c6580b53570a30ef77595a0e6e7dec7ab492abf5d129e25a777c6a1a616919e7fec63a1f447e1f103d8f
-
Filesize
829B
MD5fed4d09152e862f3121f8ae309bbcbe5
SHA19831fa2c13ef9145ea4369b3bba005f9f34411cc
SHA2564e0a25e30f7062aa1157c9b631364c9dac294f5643e6ce49753ad74a2035da8b
SHA512024ebf127878e112060acb8b328c8d15d5b69bc09c0ccf63dd7b859c778551e8d2d6752d7e2fa072170efaf0870a44bbd4a11f1f80b2372d514099474c0d9e8f
-
Filesize
633B
MD5d4bd58ba1cda284fe6507bbf5e0b7dc2
SHA1ad4ffd053a943d212ef17e336ccf2d33deed033e
SHA2565f44685ca39a5bf3a23740d2120173310b955a01d832ab61139ca6b1d80e9d3d
SHA5127c2f0d1b6856af6dfa9ccf147421b95878ef1b194f773fea388b2b00df68aebb14b782d618a69ae22f637ddc7f6f6e2742a89a6552653614a7548855905cd7d6
-
Filesize
363B
MD50da942bd1202cefb3817adf9045313e1
SHA1ef21ca33231505a0f7dbb6193991d339ffce935b
SHA256485dbd6b9e3ef0af9640274899b95a1610abb3a1e6c8eabf3a07c3c9c31ae327
SHA5128a98a83faad622998848c749235628dbe36032858082a983d2c8f49d397521263032090c7c5bbad16d69e071d3cd8c6dd4fb361277f2522b91212757b7d411be
-
Filesize
689B
MD5b0aa4ceada6bef27e9cd5c845989ffb7
SHA11ca2299249b55acbf84b0f7bae530f2d198f3b54
SHA256c14d226f09e5c50b5b75af09cab328d2bc172480d6ff05c8e8cfa9f7e766f542
SHA512c6ab5b2afa35fdc5fd942f8d9a2b17d8a6ddbb4152e96733660c80186c1c5df054152293f4afbcfe552f5ddb1b4fdab6302da3a0bfdac39b2c90cc53df1b636d
-
Filesize
363B
MD5fcf7b79a586bafc0ad58ba6e64788ac1
SHA1a0be06618a65928f5d611a3eef6e43ddd11ccf45
SHA256b6768fef259bdc73ee01e7fe6265e26a0b9203ea995e03453620a80b61040fc5
SHA512595a2f2f35a371be7cb285bbe9c69afe55b276286394e9c44adc3f1dd95f0542fe9eb0fca48300dc432527e7ae2491e4d65112555c4523e6224cd7f0b38e274c
-
Filesize
689B
MD5ee9a8ea0a1f3f18bc8093d84e418ed75
SHA1f23b4073abaffcf02ff05457c5a43275decb83ef
SHA256466b8e03bdc172f5a734e9103e887119a80be9c5be9b90c8ec0d7825bec735c7
SHA5126d81051cc14bdf805cf4b6b7599d2d591a6e50b5dee414eb98732e868930596b819926b93d577558b2ef7dddc30e7b294c244099af511ad58f37a2afd3b96098
-
Filesize
5KB
MD519b0e57acad90eea4f9ab3113c9e4a03
SHA14db080e95818f1e98580543e84a1f42b5735b366
SHA2565a7d043e68fb2bcaee0c733b53d2a313dfeb239785dc5ac1dccadc526fa23d52
SHA512370f772b370663df7659dcb40ea59030438b89ab7cd63692670eebc8fb665462662b61e04f3c31f006f71083fc8baa7db17056e65185720338212759066b88de
-
Filesize
6KB
MD59f0e4574067966265ac9bb1fc89b2430
SHA18023b0fbeb86ed731ffc99f201f6866c4b00fa72
SHA2567a89c76f5103b04a0ed9219c0a22bdd94639d97c3c725503ba4f978a15165ca6
SHA5129358befb7507213d5e8d0fb481ee1b07edbb0e9e53e15ff90711d696de1c4d3f9bca985f8d4e9d3e9ffb776738d3041b51d9e6ec3c324a876e18cb92365c6729
-
Filesize
5KB
MD5fe16f8738c96747e70af8286cf94a2d7
SHA1f9eeaf8a03bb509e77efbb8a3953feefe135499e
SHA256d3cc1459925f3eb6e15e29e21a6d1615ca32aa1d12e28c728397707438748d36
SHA512aab8118edb5f2ed2c6f0cc219214baa719dcf129372e60025d37671012a34c547ad4f224ffa5ab7df71c25d9b16e327701e6f80ab14be99d65835ae7348e4586
-
Filesize
6KB
MD5c9d491e066af7bf58bbca2b2a18f4d42
SHA106d0fa8fed3c71821118837025d85ff94e9d3737
SHA25655621335e691c612f80f367f5b80202434931a3a3ffc2dd15fe3d82746669510
SHA512457df60f0ac2ea166d9b037ca575ce7ae4465eafe11b583239f2b2e1c11ef9369ded30a76fed35495d46a6608a53e4fe3b1209484316a5a3b3850a6f1be2c36b
-
Filesize
5KB
MD5846403bfeae71ba7ffa31542329368f1
SHA17005b2a52108e5650d1fcaecddd9d6cbdb50c36d
SHA25653d265ee78d1beae07917268f741166133b2f5bea1fa14af1fa78081abe8e65b
SHA512327d6000ada67b5c96748b55570cfa9686fa7dfa91a87523d5252e7041059a057566c10a482afd8bfeb6247901cf8aa8a1f75ab49308d92f54695fc29b1dc170
-
Filesize
6KB
MD59d2dcbc4d5c7166c0dfb4ed162cd4832
SHA1c1adc98c3f2a29061c47a0182f0ee72242aab59f
SHA25607f702323301169d655ad074123cf1f94412851cc53e09a7da55be2ae2d8762a
SHA51229ab8301d8e0e6234486be1236a4df6a7e5b242987b12c6718e6a892936c1f26572ef8f135365439d2b9d3d97854ff8c27835be2ca990deec5e8ef6a8dad15ce
-
Filesize
5KB
MD57a35165c9478f77430524f95250dd9e1
SHA18fcc6bdeaba8df4094d92259b71099ff421279d1
SHA256b3ff40527b746f8e5337152aed526a582966361055ce0e8a097f335f02097278
SHA512831996d5d5b8f06901778b07f6ab3d91037ebe769089d1feb2ab2e2dd6173d6068985555f43db4271b3bc26f0cbda6fa797c850c42fecc5bac882a5e260460d7
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\c5208c35-6752-4055-9058-8f1851e2ea52.tmp
Filesize6KB
MD505246365c75bd9587bef639546d85796
SHA1dc0493d113584c6a76dda6e75cf0ad79dee7d1b7
SHA256e43f1c1ca4680c248eb89ad391f87f6de0e8c45da39857f6c1df8ff2292dce68
SHA512bf457d75d43c18cc2e5bcb9e806e57ac32077c4655293fb9601a0b6890299288ec6456311bdf729a8324c24e8a34bee587d0b051b9c8f856c5a9203f93954ccd
-
Filesize
344KB
MD5a57d43ae00e6eb542975dd9507ddbf52
SHA14ffae3a0f386357c26dbb54c61ffdb43cea80fb1
SHA2564cd01818549c8ad4835f5e1eaff03e88779f2889d85c7e4cc0d285ee1d91f26f
SHA512d947fd550a86b682ed30424ffca4755595f878fb97408b8d6ccc9b7305955b306893a05f60a50d405e0329e3f10c0195a214f9e55c303a1c2e775223a459a281
-
Filesize
344KB
MD571c9bec9b230cde426db60bb682e9133
SHA18619bddd6c2c9082f5e16d87fbadef8ddf1908ea
SHA256e620accf3b4463aeb5c1cc9bcfa054853a06d39e7facff95039ebb2b2f3e5ed3
SHA51245f3693826c2d51bd4e2970f6e122408bcbe1e9025cbcd00f4c54680d37e2dbaf8dfc03bf9390229e0de296ce1e3954549b70f8459a7196cfb9524eed9054b00
-
Filesize
77KB
MD59203d8beb4b98bcf5b1590beea542fed
SHA1adc3cd98049db177178b5e197a3caab5ef7761c7
SHA2563ae60309349842e9c675846b85d36d6fee8acc95692eb6295237b82c56202918
SHA512587a26ff165d2bb219f51d60a18c0115b7e972674a140b23e81bf8f26b975332f75ddaf846d03b48d3bce169b77c1b8678982dae69b4cdc06d6723951a6277b8
-
Filesize
73KB
MD54361ba1e4c13f46063d8800c639940a4
SHA14d823f56f5197f803ae32af863dba49a459fa282
SHA256d01464a85f61f5c9ceab759f929f2f59e256a7b950e994ae5f83e3e177deeec3
SHA512bb74443addc1a64d371fabd4dbccfd60c0d5f24aed1eebacdc993a335069db86327dc1a1087f28ce366989d7dcf6cdf3c9eb1f5ff23d99e284bfffe089e565c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms~RFf7aa5b1.TMP
Filesize7KB
MD5339b2118931188c91bdca2f5047eb625
SHA1dd978f3d71f547f9314252e88a9fe835837307f3
SHA2569746f76be6d65212dfef3d89fc0a38568b048de33a76965368e343d4f3b6e7ae
SHA512ce8c91104d038bfc08d65db0125e320e67e89449b2c84b192043d6ed9bfe464d66eb14e4055039ce9b66f91825a81f9b60fe5af98b4a7625814f92267cbe7983
-
Filesize
1.2MB
MD592bb79f7fecb3617d2c9de82dc4fcfcb
SHA1c103bbe417a1c51be43481eb96494dc76aab4065
SHA256133eaae6c5c22dd7536d1181be61fde109c436a0c1952cc4cb328ccbdf35d13e
SHA512ff85fca50cd7739b2d1065e56c163bff5b680af82dc6ef27b760819a033f0bcc817172a0f9f47ef8e8f1c15e3d0bf68bcaa7b3c5babd5bf37bbc9cde01909d22
-
Filesize
117B
MD5c12fc7d52b7dedb073b07b4841b2e4eb
SHA15922f975d6a1befa9f139175b79d1d3f99f7999a
SHA256841e72ace234fda38575b766faa7dd669d08b63faba5e2715051e57022829a06
SHA51241e67561478bf8589ff0108681c2eef8f16bba627025f49474c822ded5863eff9c0f45b855aaa4a503bbc8dc28ee4499790082deee28d4c870c3ad6a9d37e617
-
Filesize
892KB
MD5bc95cb794171f208fdfa855abafeac46
SHA1a6c1154684ecd069dd9fd72e9f178e58a14c5685
SHA256057d9cf8374006100dada04df3449791b28730b4141431f52aef594062a3b361
SHA51214f3329509cfdada94b464ff2c781a70e6215eb9f6d8a215f89b62d3f5a4333d9cab7bd1f7598eb1a8ab5436d353bba83695bb6b7060a2f5ceac277a06ef9a8a