Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 22:38
Static task
static1
Behavioral task
behavioral1
Sample
7z2201-x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7z2201-x64.exe
Resource
win10v2004-20230220-en
General
-
Target
7z2201-x64.exe
-
Size
1.5MB
-
MD5
a6a0f7c173094f8dafef996157751ecf
-
SHA1
c0dcae7c4c80be25661d22400466b4ea074fc580
-
SHA256
b055fee85472921575071464a97a79540e489c1c3a14b9bdfbdbab60e17f36e4
-
SHA512
965d43f06d104bf6707513c459f18aaf8b049f4a043643d720b184ed9f1bb6c929309c51c3991d5aaff7b9d87031a7248ee3274896521abe955d0e49f901ac94
-
SSDEEP
24576:mGIyixBMj+/A2d+UKnvT+LwZWj7iDDVVYrz0rbzGTw3DoA/sk6smE:mGbj+/BpKnvyIxVV/XDoAfmE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
7zFM.exe7zG.exepid process 1944 7zFM.exe 1348 7zG.exe -
Loads dropped DLL 15 IoCs
Processes:
7z2201-x64.exe7zFM.exe7zG.exepid process 1308 7z2201-x64.exe 1256 1256 1256 1256 1256 1256 1256 1944 7zFM.exe 1944 7zFM.exe 1348 7zG.exe 1256 1256 1944 7zFM.exe 1944 7zFM.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
7z2201-x64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2201-x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
7z2201-x64.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2201-x64.exe File created C:\Program Files\7-Zip\Lang\tg.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\readme.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2201-x64.exe -
Drops file in Windows directory 1 IoCs
Processes:
7zFM.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico 7zFM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 20 IoCs
Processes:
7z2201-x64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2201-x64.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1376 chrome.exe 1376 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 1944 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
7zFM.exe7zG.exechrome.exedescription pid process Token: SeRestorePrivilege 1944 7zFM.exe Token: 35 1944 7zFM.exe Token: SeRestorePrivilege 1348 7zG.exe Token: 35 1348 7zG.exe Token: SeSecurityPrivilege 1348 7zG.exe Token: SeSecurityPrivilege 1348 7zG.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
7zFM.exe7zG.exechrome.exepid process 1944 7zFM.exe 1348 7zG.exe 1944 7zFM.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7zFM.exechrome.exedescription pid process target process PID 1944 wrote to memory of 1348 1944 7zFM.exe 7zG.exe PID 1944 wrote to memory of 1348 1944 7zFM.exe 7zG.exe PID 1944 wrote to memory of 1348 1944 7zFM.exe 7zG.exe PID 1376 wrote to memory of 1992 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 1992 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 1992 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 616 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 1748 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 1748 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 1748 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe PID 1376 wrote to memory of 608 1376 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7z2201-x64.exe"C:\Users\Admin\AppData\Local\Temp\7z2201-x64.exe"1⤵
- Loads dropped DLL
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
PID:1308
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap21725:2484:7zEvent29075 -ad -saa -- "C:\Users\Admin\Documents\Documents"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b39758,0x7fef6b39768,0x7fef6b397782⤵PID:1992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:22⤵PID:616
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:82⤵PID:1748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:82⤵PID:608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:12⤵PID:2012
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:12⤵PID:1064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3580 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:22⤵PID:2076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1192 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:12⤵PID:2184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3916 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:82⤵PID:2264
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1380 --field-trial-handle=1264,i,1116201381413699569,5606581321697947329,131072 /prefetch:82⤵PID:2248
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c3af132ea025d289ab4841fc00bb74af
SHA10a9973d5234cc55b8b97bbb82c722b910c71cbaf
SHA25656b1148a7f96f730d7085f90cadda4980d31cad527d776545c5223466f9ffb52
SHA512707097953d876fa8f25bfefb19bfb3af402b8a6a5d5c35a2d84282818df4466feba63b6401b9b9f11468a2189dcc7f504c51e4590a5e32e635eb4f5710fd80b2
-
Filesize
1.7MB
MD5bbf51226a8670475f283a2d57460d46c
SHA16388883ced0ce14ede20c7798338673ff8d6204a
SHA25673578f14d50f747efa82527a503f1ad542f9db170e2901eddb54d6bce93fc00e
SHA512f68eb9c4ba0d923082107cff2f0e7f78e80be243b9d92cfab7298f59461fcca2c5c944d4577f161f11a2011c0958a3c32896eba4f0e89cd9f8aed97ab5bc74f9
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
668KB
MD55ab26ffd7b3c23a796138640b1737b48
SHA16dab8c3822a0cab5b621fd2b7f16aebb159bcb56
SHA256eb775b0e8cc349032187c2329fefcf64f5feed4d148034c060e227adf6d38500
SHA5122b40489f46e305f7e3455cac25e375711a6a1733861ee7bf1b800b86eaad2f40871c219924ddceb69b9748ae3cf9de59f0edffd7ed7b5e7f35d1239fe0333a78
-
Filesize
668KB
MD55ab26ffd7b3c23a796138640b1737b48
SHA16dab8c3822a0cab5b621fd2b7f16aebb159bcb56
SHA256eb775b0e8cc349032187c2329fefcf64f5feed4d148034c060e227adf6d38500
SHA5122b40489f46e305f7e3455cac25e375711a6a1733861ee7bf1b800b86eaad2f40871c219924ddceb69b9748ae3cf9de59f0edffd7ed7b5e7f35d1239fe0333a78
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
29.0MB
MD50fa7a49471f49c157d807b0d402a937c
SHA13c8077b6348e5325880b3914a58018b7a6ebbd83
SHA25664919b3113bf9e958f52b9876f9fcd38e62bb26f821ed4129d0ba167d284388e
SHA5127ebd6dfe47ccbbe59c3563b35a3bfa23c550c6654dc23207657ba6a511131b13f1218b6b84178c029dc0ea7aff6ceb6bc233cbe88aa354c4d16c1fb300fc8c3b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
92KB
MD5c3af132ea025d289ab4841fc00bb74af
SHA10a9973d5234cc55b8b97bbb82c722b910c71cbaf
SHA25656b1148a7f96f730d7085f90cadda4980d31cad527d776545c5223466f9ffb52
SHA512707097953d876fa8f25bfefb19bfb3af402b8a6a5d5c35a2d84282818df4466feba63b6401b9b9f11468a2189dcc7f504c51e4590a5e32e635eb4f5710fd80b2
-
Filesize
1.7MB
MD5bbf51226a8670475f283a2d57460d46c
SHA16388883ced0ce14ede20c7798338673ff8d6204a
SHA25673578f14d50f747efa82527a503f1ad542f9db170e2901eddb54d6bce93fc00e
SHA512f68eb9c4ba0d923082107cff2f0e7f78e80be243b9d92cfab7298f59461fcca2c5c944d4577f161f11a2011c0958a3c32896eba4f0e89cd9f8aed97ab5bc74f9
-
Filesize
1.7MB
MD5bbf51226a8670475f283a2d57460d46c
SHA16388883ced0ce14ede20c7798338673ff8d6204a
SHA25673578f14d50f747efa82527a503f1ad542f9db170e2901eddb54d6bce93fc00e
SHA512f68eb9c4ba0d923082107cff2f0e7f78e80be243b9d92cfab7298f59461fcca2c5c944d4577f161f11a2011c0958a3c32896eba4f0e89cd9f8aed97ab5bc74f9
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
Filesize
668KB
MD55ab26ffd7b3c23a796138640b1737b48
SHA16dab8c3822a0cab5b621fd2b7f16aebb159bcb56
SHA256eb775b0e8cc349032187c2329fefcf64f5feed4d148034c060e227adf6d38500
SHA5122b40489f46e305f7e3455cac25e375711a6a1733861ee7bf1b800b86eaad2f40871c219924ddceb69b9748ae3cf9de59f0edffd7ed7b5e7f35d1239fe0333a78
-
Filesize
668KB
MD55ab26ffd7b3c23a796138640b1737b48
SHA16dab8c3822a0cab5b621fd2b7f16aebb159bcb56
SHA256eb775b0e8cc349032187c2329fefcf64f5feed4d148034c060e227adf6d38500
SHA5122b40489f46e305f7e3455cac25e375711a6a1733861ee7bf1b800b86eaad2f40871c219924ddceb69b9748ae3cf9de59f0edffd7ed7b5e7f35d1239fe0333a78
-
Filesize
668KB
MD55ab26ffd7b3c23a796138640b1737b48
SHA16dab8c3822a0cab5b621fd2b7f16aebb159bcb56
SHA256eb775b0e8cc349032187c2329fefcf64f5feed4d148034c060e227adf6d38500
SHA5122b40489f46e305f7e3455cac25e375711a6a1733861ee7bf1b800b86eaad2f40871c219924ddceb69b9748ae3cf9de59f0edffd7ed7b5e7f35d1239fe0333a78
-
Filesize
668KB
MD55ab26ffd7b3c23a796138640b1737b48
SHA16dab8c3822a0cab5b621fd2b7f16aebb159bcb56
SHA256eb775b0e8cc349032187c2329fefcf64f5feed4d148034c060e227adf6d38500
SHA5122b40489f46e305f7e3455cac25e375711a6a1733861ee7bf1b800b86eaad2f40871c219924ddceb69b9748ae3cf9de59f0edffd7ed7b5e7f35d1239fe0333a78