Resubmissions

11-01-2025 21:39

250111-1hzs1stjdj 7

11-01-2025 21:37

250111-1gpawssrhn 10

Analysis

  • max time kernel
    76s
  • max time network
    78s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 21:37

Errors

Reason
Machine shutdown

General

  • Target

    https://www.google.com/search?q=gta+6+gratuit&sca_esv=9a193cf2d9170f88&ei=ueCCZ4mCC__4kdUP3-O2uAc&oq=GTA+6+GR&gs_lp=Egxnd3Mtd2l6LXNlcnAiCEdUQSA2IEdSKgIIATIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAY7wVIsENQAFjqNnAAeAGQAQCYAUugAeMDqgEBOLgBAcgBAPgBAZgCCKACjgTCAgoQLhiABBhDGIoFwgIKEAAYgAQYQxiKBcICFhAuGIAEGLEDGNEDGEMYgwEYxwEYigXCAgsQABiABBixAxiDAcICDhAAGIAEGLEDGIMBGIoFwgIIEAAYgAQYsQPCAg4QLhiABBixAxjRAxjHAcICExAuGIAEGLEDGEMYgwEY1AIYigXCAg0QLhiABBixAxhDGIoFwgIQEAAYgAQYsQMYQxiDARiKBcICDRAAGIAEGLEDGEMYigWYAwCSBwE4oAeRSA&sclient=gws-wiz-serp

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 54 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/search?q=gta+6+gratuit&sca_esv=9a193cf2d9170f88&ei=ueCCZ4mCC__4kdUP3-O2uAc&oq=GTA+6+GR&gs_lp=Egxnd3Mtd2l6LXNlcnAiCEdUQSA2IEdSKgIIATIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAY7wVIsENQAFjqNnAAeAGQAQCYAUugAeMDqgEBOLgBAcgBAPgBAZgCCKACjgTCAgoQLhiABBhDGIoFwgIKEAAYgAQYQxiKBcICFhAuGIAEGLEDGNEDGEMYgwEYxwEYigXCAgsQABiABBixAxiDAcICDhAAGIAEGLEDGIMBGIoFwgIIEAAYgAQYsQPCAg4QLhiABBixAxjRAxjHAcICExAuGIAEGLEDGEMYgwEY1AIYigXCAg0QLhiABBixAxhDGIoFwgIQEAAYgAQYsQMYQxiDARiKBcICDRAAGIAEGLEDGEMYigWYAwCSBwE4oAeRSA&sclient=gws-wiz-serp
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffce886cc40,0x7ffce886cc4c,0x7ffce886cc58
      2⤵
        PID:1808
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,5264607354732338563,1464664645939164162,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:2
        2⤵
          PID:2320
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,5264607354732338563,1464664645939164162,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:3
          2⤵
            PID:1468
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,5264607354732338563,1464664645939164162,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2392 /prefetch:8
            2⤵
              PID:4368
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,5264607354732338563,1464664645939164162,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:1
              2⤵
                PID:2016
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,5264607354732338563,1464664645939164162,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:1
                2⤵
                  PID:876
              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                1⤵
                  PID:1484
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                  1⤵
                  • Enumerates system info in registry
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1220
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce84446f8,0x7ffce8444708,0x7ffce8444718
                    2⤵
                      PID:2640
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
                      2⤵
                        PID:3272
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:3
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2628
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:8
                        2⤵
                          PID:4044
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
                          2⤵
                            PID:4992
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:1
                            2⤵
                              PID:1744
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                              2⤵
                                PID:3348
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                                2⤵
                                  PID:2568
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 /prefetch:8
                                  2⤵
                                    PID:1048
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2688
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                                    2⤵
                                      PID:1612
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1
                                      2⤵
                                        PID:2356
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
                                        2⤵
                                          PID:736
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                          2⤵
                                            PID:4072
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:1
                                            2⤵
                                              PID:4504
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:1
                                              2⤵
                                                PID:4196
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:1
                                                2⤵
                                                  PID:3528
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                                                  2⤵
                                                    PID:3576
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4880 /prefetch:8
                                                    2⤵
                                                      PID:4372
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:1
                                                      2⤵
                                                        PID:4556
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10108157837557743527,9802950459984177783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:8
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2024
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:4516
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:688
                                                        • C:\Windows\System32\rundll32.exe
                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                          1⤵
                                                            PID:5200
                                                          • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"
                                                            1⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5428
                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe" -burn.unelevated BurnPipe.{EB3CBD53-C587-47AD-B90D-C7D830743227} {53AD9171-B804-424F-9A06-56B73EC47BA5} 5428
                                                              2⤵
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5452
                                                          • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                                            1⤵
                                                            • Modifies WinLogon for persistence
                                                            • UAC bypass
                                                            • Disables RegEdit via registry modification
                                                            • Drops desktop.ini file(s)
                                                            • Sets desktop wallpaper using registry
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5944
                                                          • C:\Windows\system32\LogonUI.exe
                                                            "LogonUI.exe" /flags:0x4 /state0:0xa395e055 /state1:0x41c64e6d
                                                            1⤵
                                                            • Modifies data under HKEY_USERS
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:5700

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                            Filesize

                                                            215KB

                                                            MD5

                                                            d79b35ccf8e6af6714eb612714349097

                                                            SHA1

                                                            eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                            SHA256

                                                            c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                            SHA512

                                                            f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            192B

                                                            MD5

                                                            1d63e9227cbe2890a09d1bac4b143040

                                                            SHA1

                                                            526022c42d8ef2afa00b2d54fc71cbddeb12e565

                                                            SHA256

                                                            8876d570ec20a6c1d7ab1e62b226068bc96d5e9685229391cca438f6b972d21c

                                                            SHA512

                                                            ed3263e921db900cec40e74b54faff873f416663f35905ea5a280d1d461c974c09c43450a78b38354e4e2832ccb1a4a4a990c9e3e46debda93a6aa68f61638f8

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            9d67a1965cedfa81e47fb3354625e1b5

                                                            SHA1

                                                            4b754a2c2533b3cd29f1446005357e55b9b94b09

                                                            SHA256

                                                            367744c61e54a6274e485ce971c5d3488b516c2f9a19ef9ecd79a00bf49dd20e

                                                            SHA512

                                                            3c16e86cb4b5abd3368703d7b60894836ebc740465736089814c0e5f5def47ea646eccf91a25cbeeed60975f9b2a6a3573733bff2889eb803d6249cd53eee10b

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                            Filesize

                                                            356B

                                                            MD5

                                                            198f5a685b3baaa4fe177845208bf323

                                                            SHA1

                                                            3032c2b4048414786ec6deb4d5065bd5697db899

                                                            SHA256

                                                            67b8b886151ac04644d10c928f9ca3e419dbbbab252752bfd92ee85720a64740

                                                            SHA512

                                                            318d21921f94b8e1e7d5383f8bbc6e5acbcd16a1bd965f392cd5f212403adf0f3613ec0a212c6909c2809ea7633f508754fe1e4272c0ff203e28f25cca2ab348

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            88be1f951ca5a819eeaa37cdd061d588

                                                            SHA1

                                                            e8f76d53f057187264b86225fb5dfbbdf3fd7e9a

                                                            SHA256

                                                            2447c61153c8fe03947689f9b39d1005817c92afaf5f59da7f31f1da3fc23e33

                                                            SHA512

                                                            e4fdc4db1fa0d6b58f468e8e2bf22f98ff22da17fd6b76317dfd20aebc7702c091853bda4c690dfb6ed33057df126adc9f3db1c7407a8c672662604485aae5fa

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            116KB

                                                            MD5

                                                            2b9dbd86bae0c2d8b0d05bcea0a8f6c1

                                                            SHA1

                                                            e6d06a80b24e4997f2d256cefe24890726d5387f

                                                            SHA256

                                                            4a1cbcf21474dbfd098dba838bc1f9262c951e54e060050d4247131f50976a3d

                                                            SHA512

                                                            1c14e73e4f1ebb7c0bcfeb85dccdc78fc68eba1bd4a1fabffdc43bb3dfa24a823271022a0e3e8d22422e4827bb05bc6008ad587a71b0023763a3ee30cc9f18d6

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                            Filesize

                                                            264KB

                                                            MD5

                                                            f50f89a0a91564d0b8a211f8921aa7de

                                                            SHA1

                                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                            SHA256

                                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                            SHA512

                                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            a0486d6f8406d852dd805b66ff467692

                                                            SHA1

                                                            77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                            SHA256

                                                            c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                            SHA512

                                                            065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            dc058ebc0f8181946a312f0be99ed79c

                                                            SHA1

                                                            0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                            SHA256

                                                            378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                            SHA512

                                                            36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            71bb3d0dabc4021574f1e571db15f065

                                                            SHA1

                                                            e12818221ed0b2915d1b9584a59da5b4a7487d42

                                                            SHA256

                                                            e8340bade9a86c81853c4d2de439232f9264d5ed56a8bb84115539636c0507be

                                                            SHA512

                                                            87454b8f1d8f3297b35d53ceed59fb11cbf7d5c5fce2ef4bb4b9fdd93e9d578429fa7ca8668bfa9ca0ebd920c31298dfd22d75c2cc0fa32bb642dc89dfa51429

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            865498592348c7bed13598a33e596121

                                                            SHA1

                                                            5d230a4ef7c30f95e616739e872627e03c58d030

                                                            SHA256

                                                            a3fffbc17f62e6d9e8b7ae27849e3a5b7f8eb6d062d4d5559d77723259c2712e

                                                            SHA512

                                                            5f3f0aecdd9fc63092c75799d421a00812f34fadd7e18b3b05b1f93ddf2faeafc83971987f4814054d65aa4a95db4e38f36a935e0ef04285b74e4da4d71b0d25

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            26fd159a57bcd9f89e490af9eaacb85a

                                                            SHA1

                                                            ebf79afaca654abca93a2b82f772b148ad786a4d

                                                            SHA256

                                                            f69be7d61d0209d748294e677e06ef04032ce2117ac73dc0e9639d092325cc53

                                                            SHA512

                                                            8278f328655294c44194fcedc0492d416d1c253493f7e5dfa682abb72b75c4dd7b52b2391953b3c2b26c86b6c0ba318a8c4edc9145af9ff8c482685d28d57ba0

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            0b4ef93613ca6a3c4a7ab42818b03510

                                                            SHA1

                                                            f93ad3fa9d67f416ea781f905551d9ec06405c2c

                                                            SHA256

                                                            cfcc96a74bdfc1292a1767a0c4351587d65c90fc6fd9715e3eac26d0d9c37d9a

                                                            SHA512

                                                            4449de81870eecb95d87b6e8efbedbc89fcf0dba2e082132df7d60263c3bf349a9d82a6500c29515e8a10f81aeba68420e483e9bbf72f5054399e5b305e1e2a1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            e771c015d539a4c5363d3161f7d99306

                                                            SHA1

                                                            0c8104fb095d90f828621efabc559b92e721de8a

                                                            SHA256

                                                            c51b8381922cbebb1370fabb368125cae56111a267e4d6e5cfa99bca95880c6e

                                                            SHA512

                                                            f0bbabbdb89713325145659df1d1948dff98a6db74fd950e95a71a7938edcad1c7d2305a7f7159837449e1a5a9a8b469f98b88b01b104c76c484a6866869df45

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            44154075884de3c8bdabba70af9469cf

                                                            SHA1

                                                            c778ba952a89338fd5b9cd8cab39ff42e8032337

                                                            SHA256

                                                            07c69addeb225dfefda5a24a0ede6f9c0dfcae7331ac57e0aa5f7952f2b084e5

                                                            SHA512

                                                            c6f744e228935c2150a1bc03bdfb0bc451b282a040e1eb1137e308fb7c7ec1a668bf64ee2f9633b2b7697f0748c0de206c8b44526c002f898545343e84a72482

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582640.TMP

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            4729b44760e8f9406c072ff6f3c3408c

                                                            SHA1

                                                            18ddc10b852e25785bf8aef40e22a26c55a9f7d6

                                                            SHA256

                                                            b1d606197f439690bd70e145efea86ca5ad7da16ee6cbe81b3c17c0bcb4c57bb

                                                            SHA512

                                                            a63958a85e4cb9bdbf76c2c4f5f26247131ac47ff86229071334313d79fe802ed62e8011f7467d12977e2789ba6ce38e8d497be5002ccc1374a99f1719efff84

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            6752a1d65b201c13b62ea44016eb221f

                                                            SHA1

                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                            SHA256

                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                            SHA512

                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            1932957d0eb3a2bd44fe4aa3e853b5af

                                                            SHA1

                                                            923d0498d712f94a78b57ed522063a0c0221920f

                                                            SHA256

                                                            34e1e38019f1e9b94aa22c338ee24ba138790fc58b3a511abc6e015540404146

                                                            SHA512

                                                            205aa5679b9ff20e8b39fd1c7dabe9e911ae54d03a2113ba4778acff39f74834e18cf6a179b582f593c3a95eb87b278c92e6fa67cb7822dd7081a0520212bfe2

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            73c7ee930e9b090a46548c5f68c9d67a

                                                            SHA1

                                                            3f7b52b24545e1ce7a0945d67e6f1a2856f08fc3

                                                            SHA256

                                                            c35586fa87a98215d97c5dbb7c365b82f3c3ac7ed4f26385fe28dbf0a4fa2b6f

                                                            SHA512

                                                            caed8cfd7a99b6aba693f725fb8d3639666e551e8719575e1f7c573f507c9343ec7f481c37c07c6836dfc0a965fa5521d7760336aa2c811cb93918ccfaf8a1fd

                                                          • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            d6bd210f227442b3362493d046cea233

                                                            SHA1

                                                            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                            SHA256

                                                            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                            SHA512

                                                            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                          • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\wixstdba.dll

                                                            Filesize

                                                            118KB

                                                            MD5

                                                            4d20a950a3571d11236482754b4a8e76

                                                            SHA1

                                                            e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

                                                            SHA256

                                                            a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

                                                            SHA512

                                                            8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

                                                          • C:\Users\Admin\Downloads\NoEscape.exe.zip

                                                            Filesize

                                                            13.5MB

                                                            MD5

                                                            660708319a500f1865fa9d2fadfa712d

                                                            SHA1

                                                            b2ae3aef17095ab26410e0f1792a379a4a2966f8

                                                            SHA256

                                                            542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c

                                                            SHA512

                                                            18f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517

                                                          • C:\Users\Public\Desktop\ᣝ〺መ⬹࿠ᥜ՛ၖޔ᚞ⶐ⧮੨⫸⢜៤⁸ࡨኦ᧊℉٤➝ڪ᥊ᦦᓓ∾Ֆ⻚༁

                                                            Filesize

                                                            666B

                                                            MD5

                                                            e49f0a8effa6380b4518a8064f6d240b

                                                            SHA1

                                                            ba62ffe370e186b7f980922067ac68613521bd51

                                                            SHA256

                                                            8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                            SHA512

                                                            de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                                          • memory/5944-551-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/5944-728-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                            Filesize

                                                            1.8MB