Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/12/2022, 20:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pnrtscr.com/fep8be
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
https://pnrtscr.com/fep8be
Resource
win10v2004-20220812-en
General
-
Target
https://pnrtscr.com/fep8be
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\International\CpCache = e9fd0000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d034db9f8d1cd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f72a6163a4ccd6458685cb747bbd7a2600000000020000000000106600000001000020000000f697aef66981006964db7627185f6b047273802c3dbf06dc11d272e42aebf7b6000000000e8000000002000020000000bd8f9a67055a9c381f80ea8adf41969fb5ad184d26e47f82f5ce29952b803a3a2000000044b903dee77a1af478afca9b4f5323355195181f8a5a870513e44555ac5fbad0400000008ea25aa75ba26f3ffaf5f0eff49151532fc3553a2dcc933395b2d86d7d35ba1056078b748eae6aeaba723c0d4e3fc436f326a329e629528688a2b827bb0b9fc5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5BF3F71-8880-11ED-AE24-CE372EDB0509} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\International\CNum_CpCache = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "379197192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\International IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1532 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1584 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1584 AUDIODG.EXE Token: 33 1584 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1584 AUDIODG.EXE Token: 33 1040 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1040 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1380 iexplore.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1380 iexplore.exe 1380 iexplore.exe 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1040 1380 iexplore.exe 28 PID 1380 wrote to memory of 1040 1380 iexplore.exe 28 PID 1380 wrote to memory of 1040 1380 iexplore.exe 28 PID 1380 wrote to memory of 1040 1380 iexplore.exe 28 PID 1616 wrote to memory of 1624 1616 chrome.exe 32 PID 1616 wrote to memory of 1624 1616 chrome.exe 32 PID 1616 wrote to memory of 1624 1616 chrome.exe 32 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1540 1616 chrome.exe 33 PID 1616 wrote to memory of 1532 1616 chrome.exe 34 PID 1616 wrote to memory of 1532 1616 chrome.exe 34 PID 1616 wrote to memory of 1532 1616 chrome.exe 34 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35 PID 1616 wrote to memory of 1032 1616 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://pnrtscr.com/fep8be1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6124f50,0x7fef6124f60,0x7fef6124f702⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1080 /prefetch:22⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1788 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:12⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3276 /prefetch:22⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3352 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3584 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3596 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3588 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3848 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3892 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3876 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=672 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4108 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3912 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4000 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4076 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,10417351166968263447,6399404880337503687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4232 /prefetch:82⤵PID:2504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ad41b8165b649a43a7c7e47731489074
SHA1d51dd8535af452fcf95f8f5d7dbd72c145185c35
SHA2561e4cc6331316f05ea927881de7cc1a1e8766bc280b617ccf9b147a94b169f176
SHA5129929dba6dee2b9f23670aa61e19c8247a38cc50f81c6458c7596a39e568f84d4b2b3756c541e8ced031877cc4d8cc706db11c1bdfaa9bec11ba1e85c846282a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_18CF33A810D0A2D5C0C28C211FE5F3C8
Filesize471B
MD5756c77d7d577e0260b6e1ffc3522e77a
SHA12b7e2dd5b3df6768d0d7d20d67988ac60dc28234
SHA2561d1598a7f732980f6376fbadd56d71b4497454939a7b9e784adaa9c3f91883d4
SHA5124412160c9e16d86d576289fe07142c21b732c990103bbe84073795576cbdeb4e950cf64902f9445d9ec38e09b8e2720772658587b59d3ca13a8e7cb2ce6c015b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D
Filesize472B
MD5069c09a74c8f7ae8409e60844b2cf07d
SHA16ce866430b7e0b579378a7f10c1dbbd45ec95cdf
SHA25612bfafd537a26be5b4fe158a347c0e59477be02a9440c0e67b66fc81fe9b96a9
SHA512e68e8545c4c2d47a0f40d483d53931659b9d2062975ead5f0cbf2467aa6bdc9694c72a2ac960be7319f362706d84715a5cb07e4b84afcfb6dc2a001196decbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ae3db5baea9784bdc794251b70723e62
SHA1b0e5277d55b9a216bcc05822ebc2988b96ec02f5
SHA25654a7b1b7a38a4d7eeb8c0bee53f354d9aacd3ef868aba77f4453a4b8a541d6a1
SHA5122683c1f98e3c46c44335aa232136bcd88ebaa097fbd9025c447289ece170b6c63910b1d8a949eafa776ca978af310cc6584d7f0fce29ebbc587aeb2a678cb280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_18CF33A810D0A2D5C0C28C211FE5F3C8
Filesize410B
MD5530069cef49b0323b2a6b1bb0381c63a
SHA16a42d13f167435e4c99a8bc5aa898ecdf8445b48
SHA256113f781ef241b4e2f103bdcc2bb4a853b2600463310801fd0598e4ff1d0ff8b4
SHA5127420b531ace68178db74816e15e35ed00dfc59dc0e04a4bbb79a42b1f8cdf8922188e94de9c7589e5973a7c71dddf2836ff4a13ac713fc0aab921b87980e1d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b79a6e515a19ffb2695cf7b2ea464a
SHA19dc827ffca074562bc7b39001d990a679ffb2539
SHA256b0b7d2c776fe3ef77b93a290628216a0cbb50abb781de6996632460df5da9724
SHA512fa6fac37f75b7b5cfed89293de670702a218bf399a659c9b97a3295a28482d7136d8afff88c0a761a5308b66fd45898a75dcf59524b2bc717561dd802d7f46bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D
Filesize402B
MD5643fa4262ea04e632b1bcff3c7f30ec0
SHA1e35a1d20faef90c512fc056f5effb2cd3b6b118b
SHA25689f7c56ebccbb22ed530ef79983339ca7540b27d8b307bdb9ce38a37dc34965d
SHA512186d89748fdc9fa030241641fa2ca6aa542c18d708cfb0375c53cd840f536464640042fabc0ac30840f354a0927454405a175d5f267dfcfa60d977d3bbef38e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5cf269f10e54ccae61436f423201e64d6
SHA11d3d97428b1041f2ed6744b57a081db4fbba3b45
SHA25649e9122458ac2912c15846cff5b22b0bda4d218918a11ffd99644bc7619bd41b
SHA512397a5547217a550f7d23689ab7eb51e9597886eaad928621592c1ca3c378092048a174602d47563521f3ec0c26894ba8cd88bf5479322f668bc12975d4234a7b
-
Filesize
608B
MD5d13458067b8babff5f09df5f1e25511d
SHA1ab5a16875952d90408e6533a9138481b9a6c2780
SHA25629503bda319136e981281c869fc1d83bc0e10c3ba8a52083e4aea801d97c7255
SHA512d5a9ea825774a1759f748ca632a3f55f6cec9fae91d94acc567b6f08384b59ee3253dd588d355f5420c0054ce2f1c488271f68a98e78aff98faf71ebe241c91c