Analysis
-
max time kernel
41s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 10:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://archive.org/details/malwaremuseum&tab=collection
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://archive.org/details/malwaremuseum&tab=collection
Resource
win10v2004-20231215-en
General
-
Target
https://archive.org/details/malwaremuseum&tab=collection
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000036a6ece8dc01dba8e21454416fd4d73eafe7e855371cb4666529d7defd554e47000000000e80000000020000200000009c1aad4df041f77428229e6ea73247fd8a751f3280efa455a23014022d8bef442000000065309b08d86562dcae3a63a98b141575ef271a9f22a43cecf16ea4dc03d2b452400000006ac91f056f5f447bc10be9e128e57b756d8c9d44cb1db94216a1cbe33fe41daf4a65acfdef5a031d7b14936bbf88518c4a0a3fd252184460058b8804b2f82b55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDFF2711-C34B-11EE-BCA6-6A53A263E8F2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d957b65857da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1108 chrome.exe 1108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe Token: SeShutdownPrivilege 1108 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1996 iexplore.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe 1108 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2224 1996 iexplore.exe 28 PID 1996 wrote to memory of 2224 1996 iexplore.exe 28 PID 1996 wrote to memory of 2224 1996 iexplore.exe 28 PID 1996 wrote to memory of 2224 1996 iexplore.exe 28 PID 1108 wrote to memory of 1752 1108 chrome.exe 31 PID 1108 wrote to memory of 1752 1108 chrome.exe 31 PID 1108 wrote to memory of 1752 1108 chrome.exe 31 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 600 1108 chrome.exe 33 PID 1108 wrote to memory of 2740 1108 chrome.exe 34 PID 1108 wrote to memory of 2740 1108 chrome.exe 34 PID 1108 wrote to memory of 2740 1108 chrome.exe 34 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35 PID 1108 wrote to memory of 2016 1108 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://archive.org/details/malwaremuseum&tab=collection1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66e9758,0x7fef66e9768,0x7fef66e97782⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:22⤵PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1472 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:22⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1084 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3408 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3992 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2748 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:82⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=580 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=536 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2520 --field-trial-handle=1328,i,1405060003273756974,2225298463029312181,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD50d59f8b8a5c4cf7d519f12ee522594ee
SHA1c3e40293e12d112d9a8ee7777660e2cd68ddbe7a
SHA256de82ca920730221d8882e8a3832bdcde6f181095506cb229b2c4731715b9a6d5
SHA5125029cd948a5bb3638e44883a24af1bf70a169e18b4e30fcbe24affb95e1125c745b88ebccb0124692eff7b1c92d7f3c17e9e0b7f54e4458a4144112bc4d2912b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD506ad24caaf864617371941aa6575020f
SHA15a4cfb6b3262534d561f2eed08d4e0b7af1d5800
SHA25641259ef58a520673a3d830bc69bb40fa168af10dd1f6b280ab2d605bf6f4df38
SHA512e08ed7e91bf11c272eeea0cb647260d922da437afc9338d7c972d2c689a007b3dce82f82a3b2c63b99f57025c20dfcaaffbc2a0843b6ae58a8fbad95b7caf360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD582581235334c6885eaa497d2243b0777
SHA1d5c4c3a431f72f92e42643c4a64cfd2e065ae6aa
SHA256bb907d429e3a0911f1f14fa32b606b78b33f3de9da30332212ad207f914f51f6
SHA512d462a5b5daef1df23252d3702e09f9c0b0c12168d1ba7c3b8cb149d3547815c40e11d2865775e5c4e3dcced5d47d8c6cae90209e16e551ffa5a2a663bd1316ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2d55cec4bc7fb3d26061735b3ffb6f
SHA184dea8f3669a8c0516cae22c059bc62992fed603
SHA2565fbacb51f0747019100a24388e84efb02d20e7591aba630fe1e2e137374bb535
SHA512dcbaf03f1b211c1d43509d9e1b39f3d76506c9f4f740d5f4e4d20ea49a2f7168b3bd47b141190fec29eb4af26b4ec0f8be2b6beba32b4cc26d74ea87a63f8cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fecad24d43df8c8a7951842d710f408
SHA109a54760b2e36d21ec969ec6b507580dd9bed512
SHA2569fa773bb7a184775a7a81c3a231741ae87a8e925c01185ac5a7751387b9b9e00
SHA5129de8f569d8a592a2fc724cd1957333dfb7898782dc23c0bdeb37e40ab5594197624185dbcc410dea3a535513ddcf8790e937bd8b3af9727d3979d241594ec02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099fd3f76208c0f70b1ae925c68418d7
SHA1c26d57bb435242dae15f71778d7914ed729199b7
SHA2566cbe3c55e646f8412926ad2a2a89036e29eeebb28f77124029a72d0e1842fe8f
SHA5128eafb71375fda5eb48d456573b8f30d60be68fe4d8a1c89e2cc64d4b3d5b3aa6d5bd5a8e9aa9cf6dddd9ac4b099d08b482af8187d80e24472f0a8dba9791f422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e12427e09f7521782ac518650746737
SHA1afc6073d91adee68ca0cfa6dc1cb9b24fdbcf2b8
SHA2560c442d079962a54ee66928ed05d63eaf36c2dafb58618f45edf6cda86a171bf8
SHA51200a05cac47a2966ac93fca2d9bf7ffd2a4bac6e79a7b8b7b1a8df8955507b65346ba1b0efb0cf7fd2528f61a9b46c9eabd77e735e726e0b8b31848beb7cbb398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da00f5f55146193a0c3193cab78c53c
SHA18f1f77ab4332fb3fcf8a0f9453af37bbf77d851f
SHA2564542b91692720e1e53dfeba59c99f7a12ba34f1b3196d161856608d9d367a2bf
SHA5125b9dbfb1a8dc2563ef1ffc32ae1cb4932508fd6da55a61069804a2a491fd6e8f2406ef63c2b05a66a03bd38a16cc6a6174613f88cdfa9c67701a86bed1ce059d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd50477e1727e6482a062303cf65a55a
SHA10ce6076ad7a13179604c1e18523ea26abd50b4f5
SHA256ae1896f27b26b0518a2b68da15fcdd8413e64ecbb9ef0552c70805a318d26054
SHA512d563b938b04b2be859d7ff78b9865bbaad248fabb071438905e8d7b6f9d750cfc233073e8137ee428b0d464b9a4293dee89a79a060893db55d2a53b956b8e30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5877e9fd286a06c1122e3cd75b80ba779
SHA11f52fd9ddbbf720c5351c1a0fb8dc663e2ef16c4
SHA256f1703244c12782c49de8f40071fd2181f2e401e91022758f846b767d360bbfe6
SHA512dea0e83e1182181fa8eb97b2c475a0dab03bd9c973025a8e2c07458de62c277bf484d57496670ea83f61ed921ca36f6454a65a65cce637a059b7298b1e58ac7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d28df37a458c8b676a26ef025939be
SHA17e51d02aee3880c65156e2fdfd1d1777e338a946
SHA2561c37f2efdf2107dcdd24b902060ca747030bdd974641c858ca9d66cc0802ed1b
SHA512c11cc5a2649029e65203099060aa82445be8402593b8fc437c24a579412df87b6fd37ca7970378fcba4a5491c67a311bc0088e1bad0f6278ff06b66971e67292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86ee348281a7158c173bbe5f12b61e5
SHA13a39d4d04eb7448f04db4ecb5ec088f40355f253
SHA2560dd735f04dd74ae92f14182851c3cf0666c2989fad9a2b6f4e27f646af7a5567
SHA5126356649c065c195ddce2b90409fb92ab30b2605f2400738356c6689b5969b3e9d57970ad2a9dfb2736f01e91443abfaf8c5a2aeddbb1f9bbe891b56c1135cfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6c452a464e1f9115eb2da674d66cafb
SHA1916458edb7411b37735c40df3b74309efed4aac8
SHA256440d127b0ab11626968c82b453d96a6b9916f4339fdc3a8cdefbd3ea58169b84
SHA51279be65c0b5ac643143e66eb8510c81aff00cc17151c0c3fdff34314a89412946209f57555556841926e874668de9b29309b64fb3c81f1f95e9c0dece8175a1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee3f5948d68b3dcc9fe71afd510ad44a
SHA1ca2d60958191b9ed8da17ea81e623bb2dc2a10b3
SHA2568100b383d0dabd66760f2d6c72b84d56fb07223c6e6ef2e9895e0dc7df5b2ab3
SHA51269e1f7d1d58109a17eb7446d3f388a0a3a71f1a4e4c5544cac68fb09256fb6f65c84e8b679a766399247c463d2d69119e693dee141aed435fb42abc0f0d6b7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b177d7dd12d1e0a4cde1048be07593a8
SHA1a7a1c4221f71ea9ef59b36d4e32e4dc718cc85a3
SHA2568a3787ad740d7079881fb7174f9df2ebf9822f9e18d7e60f54f10bfe332f4c88
SHA512dfb90d8f887f870b07247e0b385909d19bb073cde2a29e0dede65063f2389c0712e5477b6756689c455816db100328ea06c1158481eb2889f005ab92a1aca9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD56936ee3f0b2d5cceb9c814df957c5636
SHA14632ab13562577dfb8ddf49b7879bb3f3471c928
SHA2561f8c62f64ff9afd08398480345e608b03804b5beafda12d540655e0536841792
SHA5129e87001a5dc19bc6bb66231d09d05a125bed230c640c110e86aca4546bd26abd751f4614b7781a4b24302ade060ee3f1490a423f4dcfff20db4439224d68764d
-
Filesize
1KB
MD549f6d25f339428f95927290193cb38f8
SHA1664dcddec8051f61486c7c382c348e6c0e7363cd
SHA25617686377337a1426b3c6cb11531252044dd94fd0a3c67ec39122a63594d04abd
SHA512499e65402d8f978ff275ac564e1fdad2c579da534490ba1f18927c5da28ce9e1c2ced3bf8b712167536557ca554ada4776b8b0db31e59f12d7de71144f16a57c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_archive.org_0.indexeddb.leveldb\CURRENT~RFf77a709.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
363B
MD5c36d5e225779eaddfe5df18d162bcfef
SHA14b00cab2936029912cf349118d8a90d3451ea6c2
SHA256140c1e14368eceaef789973637039cf7d7133b8bb6f17623a8851102c558f84f
SHA512f1b00f206d417b36b982a3f800c14beec562c2407baf42585c5007e73b6a466659ea3a27687192a366ff7375e0039405c0408b6cc186d411966002e83ff10f01
-
Filesize
363B
MD59297778400c0fadd74b8000ddec26a02
SHA11564a8d31c7450eec3b57232edc4fb329b019361
SHA2561dedb449b9482710c55b2887956c0c2d3e24821bb41edb6e81c546cce88b9f9a
SHA512172b7aef8fefcea657577309b26dfe2773e89cca0fbb1b16dcaba0b7ff09538817c04ae66bbda97ea7569991cb13c31958884fa0cb0387ad837b832eba8d0b27
-
Filesize
363B
MD5f3143c6d57dbf3dd357299199546c3b5
SHA12a525a9cd1c408d140530cc5cc7fb2d7037f5d84
SHA256f3843e52d267f665b0f12a95cfd11ed31aaa4b3fa082d09908647430d8d191b1
SHA512713975ae78a0863b3e41f7beedf48314b30d59dc69b99da36b20d9cc80d64dfb0a6531b0228a6c9427d926a2e116768258a407a63b63077c4f0db2f62eea0b39
-
Filesize
691B
MD5a7b3b0ddc4cfe4e7f0f525a010ed3ed2
SHA1378d99c90b64a5b6be36654aefb33fddd56d0580
SHA2563eb7d906e53d7b42004aaaf82913d144320fb22d0e827fce759c8f361a5a01f5
SHA5123fd1f6372c644a4597aad31a09b1dd494744874d14bdc67f674ea2116b301f7c549766f4b9fc0a8817d3244b33915c0fbae8e6924cd8cd1abae4a3b4677af276
-
Filesize
363B
MD5805bc8761fbc3f4cbf909230906a495f
SHA18f1245c331f440049f1cc8c71530cf34413a2b22
SHA2562ccb52f91d523539018f9e81fff321ee080d6528c90e402bbb339f0c839310af
SHA51210bfbd4c4ac986c0fcb204842c9cbd71ffcc8d160c69f63e84947317fa6ad191c079ab68d1df7fdddd60ab3d8caae57e5535998955f278edac284a8b50c595e3
-
Filesize
691B
MD5c0d4af2cc1b01278a1035d4bf1dc3aa3
SHA1673507f7c3f14c2dd781e732721a20ad2a722c6d
SHA256561da30c1aeabe8727f1d07860562906955d90df2888cb305f8b4d62ee28caef
SHA512fa08c86b69b8c86eb0aa0e855501762f556b42e600df00e3b0098e7ef5019dd46b2eced9a11e277aba6ae7b46a06eb91670c1650824ce1430eeb7de8f1905c6f
-
Filesize
5KB
MD576b3db3dd080f95c73ad53ff50b30c11
SHA1e580caefbbbf1b2a093f869a59dcb72be5584a09
SHA2564c72ef7791023a8d66423b965712319ede497d8426d61d36306877ab4c89e4d4
SHA5129374f5f9ba98675961ddd9596a34329c771f6c8a8d47c0ffd583dac72a3dfc9008a2a52c2c6a8846ff4d7ed5d0d38f002ad872980c9bddfefa80fa8a510c6e34
-
Filesize
5KB
MD51e9ef967fb64265b285863b763d373b3
SHA1a88a8f0ab2a16272f4d4aed436b279782bbb59e1
SHA256b94192e847a0cbcbb933c1015a1ddec941ad2b4117585053739c8e05e59125fe
SHA51222feab6b7a577d8c8600eb612cfadbea62f8dbc52d6012a7fcbca98b577f6482025f84d939d5fba81e5c8d7cc126afced0e3239a90c23f86a7031ced41d2bf0e
-
Filesize
4KB
MD5f58fc53b6106daaa6cdd6c5dbef00def
SHA196df7dbd0bdfd51eea1c84307248ae831975cad6
SHA2561fec8a9bcbc42dad9d5c2c59def2077e7abfc685ffbcdb6e4c13ac23758f1707
SHA512fe63caebbc59db797995ff329ef8b67f6ac4d391438ef625f70e27ce1ecfa7da7eee8eb3abdf720ede558152382c55e48a50a2023fdc9151349e1b2239552ef3
-
Filesize
5KB
MD540b23cf04ba12947194a58053d81d0f8
SHA1c75632995601dd5cbba9fd9c217e2cf5feed504d
SHA256227422e6322c984354dbd9bf095bcdd97d6ac563a12e6288b5ceee6d56574e3a
SHA5123f79b0c903ce795ecfdbd5525d3893c9953f2146e48c5157c3a18678c23130386d10ecce2b653bd9f80c33af44c6c4f1ecc0ec8f303988d957fef9149f07e92a
-
Filesize
5KB
MD53fab757d98857396d3ffbca6f5252201
SHA1eafb7b2c824dd26105b6e74779d4579b13ba073e
SHA25670a28162d7ab8f3d563a72bb7d53036ead8a07495e52172c25747aac2c1e874c
SHA51228826c904711d802f15e77d56d9054534203c995209c8f46b318bc38a0973bd09fb32f39ab2da3d280b1e57da02a1c35d0ada18384a20892d6fa59d10594f43d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
233KB
MD57394634aa0573be86ad993c30cef3daf
SHA19b2aadeff3312ed0f03dee24deb6922d22638f74
SHA256ad5e678c7c7c7cb58171b93a4a337b621dc8976e7699d294de7decaef41ef8ab
SHA51213417c5c7a1b724cada69211deed968e4a3aa2f51959e362f87b3cbd4efbea71e226f07cf9cf61deebb610dd23929b43336549a52684b58e026b29f5ab6f942e
-
Filesize
4KB
MD5bf02615da829d3d2191ca26f800737cf
SHA100b51406a810d80409f587f9e5c3b90dbe2143c0
SHA256c7155c6cc4ac24de0a280a8052ca5163b66174bcd633e7c09f5f1815ec57db8b
SHA512a42f41de0b6c08aae607a5b9a7ad83fc89d2ef748f63a088ad60333581580940e1d31bd44c9b7fa7d702821c17750fa14ab5e5afcad7bc9f686ef520104fbc9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\favicon[1].ico
Filesize4KB
MD5211bed9624ca2dadf3b985f2901ab096
SHA1b18786d77997511ab0f6e5c9d3c5b9e1bff164be
SHA256abac83a6e6813515818512cbe6b8714820e43471ac10dd997023dab93cd6aeca
SHA5125704cd67b72891c4ad45e9d00babb3df9e682af573fc9e264253e3a024292c9e71db7798894546eeb7cae47ef969737f751a5bb0cd0e8571f9223e199ac05304
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
16KB
MD5a1902e6ec1b12b0da644c04d3e6ac481
SHA18e322336ef72f2e77a650b173b66eeab134bb740
SHA256ee3fbda31f1858b18e1c1348ee80258323f40c629e91aa486550a7047ab2933d
SHA51238a355db8cab96f20f3ceb124edf13146b9cf2d6c69c0e0ae1b91e06166d7b8f12ae6bc6ed180f750b1af576f537f708529dbf7c29876975257c02b64268214f