Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
secret.html
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
secret.html
Resource
win10v2004-20231127-en
General
-
Target
secret.html
-
Size
354B
-
MD5
1f7b08912c9526439a3ba5e70bf7c0ef
-
SHA1
c4e9db7ef3602272c76e0e9f6839f74abce50555
-
SHA256
80e463611a8f8cdd9732357ff67891d6860c41b95438915e1585fb0d48042975
-
SHA512
b98a0b6f0c549c2b69ff6946c99aad3aca0cedc0e4ff22c300ad59f51fc7940445476d20a40d01d23574c57929bbf8fefd00c2f47b5f198359ffaea65f64c7ab
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408455452" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f7eef4232cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F752C31-9817-11EE-AAB9-4A9A7DCC31B9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006ada02fffb05344dbbebb32fd2687d5f00000000020000000000106600000001000020000000e69993be3fa05d02a19d9570b064143d826fbeae07e9f5dc0ecfb50d4916ef81000000000e800000000200002000000034767e932fb48808ea727329d766cb7375886b31d1b7de88c618c4faa4be569620000000d8a5cd7cb2573c7343fa42275d2aa3460e9c110a9f766770c5cc827fede95e5c400000001a4afcdddc08eba1a6b938737d00ac039dda316b899bfbfd98ccb5a379903c4d8236a80ba4b0f43d3c93e9213e8dcd24c3d1b38a0a3e8a3a96ae60396f498509 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000_Classes\Local Settings IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 888 chrome.exe 888 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1916 iexplore.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3060 1916 iexplore.exe 28 PID 1916 wrote to memory of 3060 1916 iexplore.exe 28 PID 1916 wrote to memory of 3060 1916 iexplore.exe 28 PID 1916 wrote to memory of 3060 1916 iexplore.exe 28 PID 888 wrote to memory of 1624 888 chrome.exe 31 PID 888 wrote to memory of 1624 888 chrome.exe 31 PID 888 wrote to memory of 1624 888 chrome.exe 31 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2204 888 chrome.exe 33 PID 888 wrote to memory of 2100 888 chrome.exe 34 PID 888 wrote to memory of 2100 888 chrome.exe 34 PID 888 wrote to memory of 2100 888 chrome.exe 34 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35 PID 888 wrote to memory of 1616 888 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\secret.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6449758,0x7fef6449768,0x7fef64497782⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:22⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:12⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1408 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:22⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1444 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3612 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3704 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3816 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3536 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3484 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3604 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1160 --field-trial-handle=1308,i,3400923596258978740,12097358941784709302,131072 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2444
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵PID:2880
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵PID:2136
-
C:\Windows\System32\osk.exe"C:\Windows\System32\osk.exe"2⤵PID:756
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b6f0f827d6762792e0df947eb6a9cc9f
SHA1ae3c953589d23486888f1e1ff2547d84e5a69496
SHA256bf9af3c1fa4ef588fa533b7f5ff15d5366857f3ab3aacf6539aeecc2374c0cae
SHA5128f15724d94600521a3cc0f87e00b5263341ccaa03d30e573a9df28fe3a6f616de9ccd917953aaf3eb2f890993662e27139434e509974885c1b0b066cd7940167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1fe88daa99282722753e36519c2393a
SHA1039577594ccd41c7c30047e3e9fafc1bf9519918
SHA2564607ab1faacf13c114e569f1ca1596ad4412b5f6a524a40a276fe6592fb523ae
SHA512c776a57f830a1b297d10eafb43829d27a11923a3aa3b2e36e20bde87f10accade6e80cd108ce962865fbcde23bed8fe05055ca0c98180a1fea25ce1dc58321dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e073c191bbc1393838a104b96a88eb4f
SHA1b1b0642e4f94f7b60d7e76ed08b4691b4b1b5add
SHA25634ed6e704ceaf3d1fe5103fbeb7256ed43987ea04fac4931ba2408c545245304
SHA512d56b77f0838158b1750a6fabb4c2944ba46e98acfd04ea4a6ea72872cfc1f06efea60434f5a49656d98a03efa58342ee0e97b14e7e93f7cf529a41b10f6ecd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6b35770847182155e93b94825efae81
SHA151ac00a0411a98d460341527106876ed3fa56f8e
SHA256654877d446e3c786b63122bebf90100800d546f520c02af143ff8b18f0d670b0
SHA512775c5356f7ef3f72c6c21e5c95b3e11ca7c47230e1b54ae95e33fc94507e9d00bb8100bc5addc761c67dda39550b4f2185e4f0a22617d4ee215842c206d2906d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5950b674086fdd59ee92ad15d5d999438
SHA1d966306e983c2ad43a4b496fbb24d570b26867ee
SHA256bee3d5c0c6efe5afd58a6f56a2e964d0e384e1b56b239462a1da0f421c991c62
SHA512372b266899eb50f52fbfcfb52bf7388c46c5230e6998c41c55008f9f05a7b5810d7ce076c09b2cc17f20873b83cc19f2990fd2a1460f6c27a063c3a9c7de623f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525f0838ef21a0d925feba9b40f5e302
SHA1351b54500b1fc639dd4d0eaf914a3e4a56653dc2
SHA2566ae6a2cb0caf511763a3e30c2ed6711152d0a26d60d548e18bdfe0733f8bd865
SHA51280a4fda4486d7ed1d6e6877201e2fb94228d6e7f800f70a63495b3d934b72d68f39f0eea96f87ba170edea24d7ee661af84e765c7c679941d44c6b1cc3fcb098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ad56560520767ba77138f898821beb
SHA1472cb407d333e638e9c044b605cad50785775915
SHA256c3c2a067cbfc105d5ed42e26d2a2da2acaeb3b41fe4c5ce94c4f28340ea41f5b
SHA512a8f50707e17e6ebc0205865958f37ae5dbd17066abc8a4584f721bf98cfc45f932239a8cc06f19b50f317e34c6c0374413ca71bc974a6ff3e2d6f0872d8b13d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e16beec7d0ce0c195b88a1a157754a5
SHA1d193bb2a5ea7bf51a9a51007f2588ca52a34b736
SHA25674df32db1d3b135c73a170fd53680b904187f188e885c9e37edac524e5ff5d7c
SHA51200603ec8c2ebd4f747ccf95d45588760238d0462413821cc52947e421e8d343659138bb8da6cdf753d6ccad44211525b5cfa58ed3144ce838b3df313b8ca04d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abcdbd4e467291376d48c163b86087b5
SHA1bcc96e01167ad810342c8fd71221724bc8dc481f
SHA2561582889d7a0975c308c72fbf649fe9ca5312d1d1f97726d81aa0dca8f422a875
SHA5124a7eb09e0b6d9a38945675c7d6207e22cbf056756c98a75fc985f16b6f733bcfba10021b1fa22ab83c96ab206f5b484ffdfe4f6e6e9d9c5d71849b96d0774167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f01bcff20ab336defc271974ec47d5
SHA178d8c608bcb874af990d1babe8dff6114703963a
SHA256e78930699e7bfd90cf7950a9092053984e123e76182bd79a992c85c826b38da0
SHA512d1054b0ffc7eff07fbab1c8b345959b5842cd2b664f8e03415fb901b54d9699db429df80f0e1b7a0672c682a8e0450c09c9a4303cf2e5a6593cabe977b3ae669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d97d94bfb7836e632ee5d87e7577cf
SHA14e70ea42bd61115dc78a5cb060ee8f431cd71ca7
SHA256451850863da4e74ea0a62437ffcf1a8ca5e9ffe8a2d846ae7f75afefa7391157
SHA512ccab8a876b5156cf2ff3a169701e17b69dd1af30ac37c3fc9af4d7524026ba731ea13bd4416fc65cf0b02f75b37aaa1d5d80fb3b093cfe7a77abe317cf4b6482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f1d28cf400dbfb0246e4a9ab97c6149
SHA142b77da0723fff419359d4aac2d984fdf78dc99e
SHA256475a93ddfdcee74e1b69927466eb3a091071cd3c88fc59909cf4f723ae54a792
SHA512b6ec2fb4c2e8cd822ada1eb9f6c5243814257413fe0f1aceca40f6467c4c2e65572232e64babebfab6fa552a794ffeb97da2a18dfdc3ec80d421fa817010a618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e148ab5d62bc17f8a464425dc67329
SHA1cdaad69873b1e56d7f2ad97f01f93288390784d1
SHA25675a6806afea6cf6b94960a0af3c7edf572ec87a8e30ec296a0be5d38322ae905
SHA512016fdd2e2a029c09b9757208a2968d599c812227ccc38b09edf17035402dbec4dd9eae85ed998b7ae6e858df5ee954c606d1695c3cc49864ad21752b972ec5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559aab03d6c782c974ca00c077d730fa4
SHA1ec22a97e68fb8c1d203799103ab1871270c83e14
SHA256af01678bac6c34e666f31161d37bec8b83e45dd2b7968d2b0d5f5965e5610d8f
SHA512e365b5e2f506d04ecee4f42fcb5431190c6ef421916d1151629b47b8a08d424d45400edcce901f0987f78e91ba303355e2367854f78ed0ac01e15d9386824435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db604cc70d61120268df8c96a1b72e1
SHA13f1751beb2921f5cebd8e42ac1ee581df1fd1467
SHA25661bc766884a2d71174dcae050758161c97449d1640bf914934a485af9e47cfa0
SHA512bcdadc2b7422c7d56f5eb92e028ebfa7ce4339092ae2c7422bf5e122565b6693c29d1ba20bc8686f48d2313253ddb4e544b199103e587812a1bdd051b977452f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5732e7e00ab7a21b56369525740e64c33
SHA1accdcf4624410b68f036edfae705b8baffedfe8d
SHA25687b9166170ea83da83916ea5e5cf378d723aa51a8f0febc19cfc8e26bbfcedba
SHA512d7da4c5e6daf6d2986d7bbdc90ec0b5191025c976d4666dda0d1249f9b76e437ab7d9bf93743be7229a80822c8714fa85fd531a0e0d3f0bf6854e860e58304f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2a6a7964-8c7c-48ee-b54b-14955e48b634.tmp
Filesize5KB
MD51a1c6af7b723639b82a07f996f03367e
SHA1f49a120dca92e02f980c59b1c6ade63534c377b7
SHA2564f765a335f886d906d7144f503cecfc16f654769055431de447af0601a1b5a6a
SHA512862d4d541a6ef60c854419336a823b93188a370e409cf3cd3c660dc8662f3d35c17ca856c585b9a03b6a3240c7cd4913c399aa22548ee5f110a57be514a8b83b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD51ba9ec2b659723964bc741ac2af61f39
SHA174486fb50e1d6ce76ace2532612a359054bbfd18
SHA256bdade78535a899105d91ee239da8b7fc4fdaf7b525ce33111fe7572914c50d86
SHA512a6319ea84c70ad316edd5273d64bba5dd494fe91daf3c15fb0ac4457695284661a31b0c2b1c9ad90563d8015c84d4f540d6de7e31937f6e4ed2be96686798e18
-
Filesize
5KB
MD5acf1cb2876f6bd10a6e18fd8d934c5c3
SHA1994baa17e5f0514d033afc4f71c7a58134c9afbc
SHA2567ac32bb70c58e819b95d7bad4dd382c609e80d75412546eca496465567ccff16
SHA512b2a4b2cbff769df1dde92bd59bae6f11f263f12738901f5b87055a98ee3086d1467d825f1ccc7bef12b4316bafbf7c2391b351cec0a2b2fcb46da394cc516758
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06