Analysis
-
max time kernel
219s -
max time network
1790s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 15:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pixelplanet.fun/#d,28691,7677,30
Resource
win7-20230703-en
General
-
Target
https://pixelplanet.fun/#d,28691,7677,30
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0019431-1FFF-11EE-ADE9-6A51C30B8975} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ab35dbc53fd45498f88cda789e11c50000000000200000000001066000000010000200000005b7c8d2102e834aac52434f2966a1c2396726ee4f67379bf166e2aab07622563000000000e800000000200002000000067e7cded0e923abb94288ffc8c4ef4ec0aba3fccb87f570274c8046ab684e82020000000e4332194cec94fc2251a9f537cacdc71233c28405bed29dfbb80ffbe991c2fa340000000985022c5327d88eabf8821135a26aecb53439efe0ba9b6819ef62f58da4780fd18e7f5c001d1d48352378ba2afbe5dc6d751796c6526672dd76f7545c05c5ee3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395854381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404a8aa90cb4d901 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3036 iexplore.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1108 3036 iexplore.exe 28 PID 3036 wrote to memory of 1108 3036 iexplore.exe 28 PID 3036 wrote to memory of 1108 3036 iexplore.exe 28 PID 3036 wrote to memory of 1108 3036 iexplore.exe 28 PID 860 wrote to memory of 1268 860 chrome.exe 31 PID 860 wrote to memory of 1268 860 chrome.exe 31 PID 860 wrote to memory of 1268 860 chrome.exe 31 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1572 860 chrome.exe 33 PID 860 wrote to memory of 1552 860 chrome.exe 34 PID 860 wrote to memory of 1552 860 chrome.exe 34 PID 860 wrote to memory of 1552 860 chrome.exe 34 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35 PID 860 wrote to memory of 2436 860 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://pixelplanet.fun/#d,28691,7677,301⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e79758,0x7fef6e79768,0x7fef6e797782⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2196 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1468 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:22⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3312 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3800 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3932 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2088 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2728 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 --field-trial-handle=1212,i,4887095596975279056,18431479746719748485,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2836
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4581⤵PID:600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ee794798b4bfedca3a25830c7a153cc1
SHA103ffa211a0081f1e14cd47dd0f7d3b410045143f
SHA25696211b522d7388b6fa692d2a0a63cee8b6b2a25d1018f69574bf5edf9035c621
SHA5124a3b4f5d1422421daa3cab46632a0828eca852b93796fb12e23b2ae566a0ac2e02dcc12ed5ca87f88b9003317a96fd3dd1427057fe0b94a09c6b84bb8e11001e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD5cfbc16e33dcbef6f773f0f79af528f45
SHA1ecb8d5e8107bc671dd57fb2a137c00bffa419f1f
SHA256f0937890fb1053069baac97b7992c6d22cb74cae20317fc05d51070d96950ffa
SHA51259ac2ead1eb84edffb06867850beb1e63f72c5b5415abd2fd4e7c2a1922c368f612d2a0288c00e32d5da47c4a77968ffbe72660a8d1f577f44fb20df9c11a4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5131e7683162343566dcf1a39f0851a30
SHA175af4e2153fc87577912e5f678748cb4c7a81320
SHA25642beeeba7ccf3633a317124eb2d5a5db18c11c6ba0fbccfc14f348271c9fd1f9
SHA512467568ec95477a893083eb355bb7256902d2be2232c1036cb7f20f9464867f84622408d1ebbb25199870dc618a0ae65cef04b5e0cd236d386a9a0e4c99c9275d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5964a8b15c82e352dafebfa6cef1ebae5
SHA19b59029584f2d24d45bdc1ad002c19427e490baa
SHA2565f2cc717841bbd25721c73f8117bb2a2b25aeb5f02746643bb4ef35050aac826
SHA512654701f38d4583a448cc2947b6eadcc7a3ffef5d07493982ecea18171986683266065194839ea22fe0d675c4641c80b63e415ce87017c751860781833b6d4c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5cba02cd725cc226df07a4b21214b4e
SHA11bb6a51da50ebf4fac7137ff84465e5e7780f923
SHA256118a4af2fc4a561dc6b57107cde86cfbd68a0d884c98248ffcab547f337c62ff
SHA51224c156148b91719f47942275e193adf9a8d8ce320d711beecd3b8052824e7432d85d66bd99ed12c8d87535a51f8d826ee46c5f354fe901260b66fdc78e7433f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d9ba51881e544e8d7521b7c6b242e11
SHA15cf28c6a475e2f2b149497e864a830ed18e5550d
SHA256d0f02cf30e0632fc6199daa882f5a5779693f4966a9de8cd97d0857f57baae27
SHA5120afe5a13ec18886697222340e865368d65a20c66ad6ab2123da3705009ca2b435fee2e6a27662104baffd865542a44893ce088d7d837d868e18c0431c0cff362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56778b5d0babc2d0a5b98034241c2440a
SHA182ad2cafc722db81310a55f42fdd8498947431dd
SHA25621ea092a7d531a7bd65b748b674d9a17137d2c16d797c3305a3e0906d08fd1bf
SHA5124c3eac42ca8aaab5fc4436a8dd96dc3352a05d476740ae62a3fcf2eaab00894c18ef4b9bc704aa68d23289ddf033ea62619b916998bb28b72374069ede8a9b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590701d0a2e2bdc364b9f5c6faf90e86d
SHA17bdb47b27963da6a8fbdfd86e63e798b4453aa08
SHA2563554d8dcc5e5b0195b2fd394817376b140866b1572833cad8582eee9c222bc74
SHA5122640e1462100643a0dc04903b020d5bc85e59c720128e47ec336f4875e9fe33de697aec14b33f615ee259be91fea82ac55dfbefa6e3215ccd9debf1ba17b4f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571afe62bc23f0e08b5c2c94f552dbea9
SHA1a7855191f68c7e192d60798a3430d07750228bac
SHA2561f0a65a098664b8ace6d52b1804078294e5eb5a964862a282f9537a6cda990db
SHA5126d337f34a52bf2d2382c756da25211b876a794c34f3350b2a091c608cc8028a1007f2217e29bf04cdf7d1edc7de1bf277bd7ac5976409e4227b6c3ddc18d32e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6392db98272910dc9843f1b66081850
SHA1b3d0c24f0d845dc0303d1173530016f4467731ba
SHA2560ec546254ff679f95b9d8955320295fd61fe0d9fcfa224e745caf1e13f50919c
SHA512c6e51e9daedfcccb89cd994de1a70bb610e4976dc140c176509b77c5c34f8fc05025e1fd60542147082e32544a20fe178e9d1141cb17c3f610d7007003ce31ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a48ce8e6218bb1ced1e37ed4db8a3ac0
SHA1ae45dee21e11e99ed5cd8973601003cc50d5369d
SHA25617121a0c59dcebb4d13164cab9639f818906018b37d28976cf84082f95079881
SHA512bbef82ab46729dded4c1697075e5fd0806f09a1ca33997c0ff109939d7a42e3926f7599c07f07a79c5fe9e073821e46f49ce8cee37e08e080f8778ecc8752199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589022b584973f7cac82d705d1e2c8cc5
SHA192b88ec635d76df845e818d45d37ce5d9d3abf9b
SHA256ee0415e0b1753f049e2a24be597e1b4d20f6240ae788fe2ab30a7b5a1d461e4c
SHA5120de90599704268f59c1fc3fd0e7cd7954295253ca5e5e52acf0a04071d502afd3dd635486f5a8c194ed2c1a47d223f46a15254c72b13ce1dc9b2712df26abf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD544d5442b1a50eaa50e6e41d78e227b12
SHA14837726760b7de77b0595cd36b839ab588648637
SHA256dc6760d0e848a7f06f5751a000190895e2ee0040613049acbeb1f80ae6e6fe5f
SHA512bf2794937d06b6ea29c320c2de58ed5ca1ca566726f1f271fa0f0f259c8498923d768f6667ecc9274e3b04e57671222495bdc7343d49e26db02bf625726d6783
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6f6153.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD59a9276d091cb6a41f14faceb8f9d1904
SHA120445c5a4abf22753f0f4727ac04bd97eee7dad9
SHA25667dd50a1250f3214c0f805a4a029a622e4197b97ce6754ae3dbfa68ff56f3e09
SHA512afc16d64d960a6496d7afa8cd1a578cbbc34244f201994a37e4ffe0f989abe318ddd84a740ca1cdd9ea659412176634b66b160f66b7d0faa843571ed46d39d85
-
Filesize
1KB
MD59769cf0256696632f9e9d2eb7533fcba
SHA1dbcde30f2f38a81ffb7035b945e4a06d39db65ca
SHA2561f17174b627ee4dfbb9d9fa8acbf8f3c7bdd0e911c10872bf28070477335198d
SHA512ed5f2d52c2d0bef6bc93e01d549b99bfd538fd4c1e2812f3f12dd720ed7948b3e113ee440f598a0c69f329d436545772ca0b7bf23011bbb57979f4f981721c10
-
Filesize
2KB
MD54db476b8f2642b7357ff7aff96be4cfb
SHA10f21a9e611c5560a14e0ed9116af1568f78026c0
SHA256594283a922e59593f1a5896a23b13e69411e18c9be08bbb5f58c50ddc493a9e8
SHA512632afbee08a3e7f757815096235c9374cabc616cae8717c69a2bb23e43290f992bfdbad4a117cfe43ca5d225a3ed8e15c281e033368e16f030bfb6f712eb43f9
-
Filesize
4KB
MD5488249f78199df6f26992ca57e51f774
SHA16d4c847040a55123913508a80180c581c4940ce7
SHA256833713de717e66cbb30174d7de8d6a3a7c802403512ce5545e854331ae905968
SHA5128b374baedcd59904b3e3da35abd6de339aec811bbd28540849a806e5e0612be028219ea01404a2ca0280baa4eaaaf7898ecd06c66e459fe1586da32df36c30ea
-
Filesize
5KB
MD53929a8a9ab588faee33738ab61669a93
SHA181fd3237001e78f81f252c3d2bf7af6b7a01006b
SHA256c7a20496d6734faa0411766fb1dba1dcdc75162cbda245019291ce70593b9379
SHA512ecf8d95b3b9f33183e5ef201c3341343b49e26ea2e08efade368f1f6981a5d7e32a17df3e43bd1de86479410ec37f92ca72060fd08f44784dfab6580a16bb729
-
Filesize
5KB
MD5936aefa42b38e3d3716d10ee9efba17b
SHA105ef83528fc1391eb00ea755ebd0bc4f506be212
SHA256fa79c32acdd90c17d521fa65043b823a13c3b4cc06c70ba920215e0758b956dc
SHA512f49f590af0f8d3ab335fb5cf92a46b95ae5d585f41a6ff708060b3ac1254aa2a93d7e834f50b3ae140fc4f6072ea7170d46d177e1b38aeaf09d4bd082d05cc02
-
Filesize
4KB
MD5c6a493b18cca33bbf9dbb5d99c3c8be3
SHA139a89a6fd068520c6bbc7c6f6a8602c45d383fc5
SHA256e729c6fe44b79b76dcd24c52f222f1dd1f0b5ca894a5f67c26b13519b9b1c0a1
SHA51248b2ad1e9271551544db93d42f571b617821a82c312331227887c8a87545de69ffc9cd1610cc0469cae05fe1654383e0439ff0eec66c000c6e96292d0502a392
-
Filesize
4KB
MD575e9bc376d36293142a4ccd48a8a0c06
SHA140f6108dffe6c5b21f37112b9c6a4461675d3791
SHA25682a6f957bf1630247215964f32175edc040331fd5f015d68e2c9d13b3a21c08a
SHA5128c3b7025126f02584ff2bd3ef3f1b3e9d0641cbe3066c5f0467ab9e4bcd38de27fa1a5d8fa4feb317fbe6910afecef7046aee0f698868a537008a315749016bd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
27KB
MD56b2fd172d6c854028201fc8001def963
SHA11bb1b05dc4abdf0b4b9939f1487103b7118131c9
SHA256e565003783f8e033fc05338b7d737b1f72b41d3c779191f9f81345281a9492f0
SHA51250740f5832d340fdf453a7eed4a19b7d894c7fab46dea71c1c82b69b463e4e53450fa5ad3e599a6af62aaca0bb58880bd6b2f1539e71b4446c874a8d746c06fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6J6DKPIW\favicon[2].ico
Filesize23KB
MD5f26dcb374e457e9eacfe6b4d227c29e2
SHA12f01dcb88c24dc0e65af803e1286f1e5460c3667
SHA25609df566a192476092eb73f3cd5a98a4afa1f27f2c10f5afe08cf7daf4324dd24
SHA512e031be1a840ca6785c5a49c353e9c24a67e597daa1742b6c2f363b5170001b3dae6b745d96b9e09c98d6382118bc97d3003dcb518e8fe063b57ca80f0ada0bb5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JHFV4GXP\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
16KB
MD54b0f468aa3e721f506830438e0f05074
SHA1de67fe2418cd46ccc7923c04d0130cb5ce66b228
SHA25658a62a1b4ed2a91bc29e9e3ec2a802f8cdb35967aef7db04e7556695c04b6ae2
SHA512d078b185a2832edda7a2b1a0fcf11968304ccef2a8a80c7ba48b19a35903f6ccea2556534059197dd78506393f80ef5da98b012dd1f01e93774179b716f67571
-
Filesize
606B
MD5bda95972bb6bbf36799a1300560ee843
SHA1dc67b5b6bcba48059da925f1f5a5d01da2c27ed5
SHA2567103ecc9ee91effa44ad779d3a7dab00de260a16da0c320a195ffca5f0477291
SHA512d494edc61831ccee8762b2d27d202ac359e7b03de8b617b3ae1aefbd90ac81e62f293959c585d03be4ccaf309c861ce889df9c4e9ea2c665272ece722feb906b