Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
25/03/2024, 12:59
240325-p73enagd63 125/03/2024, 12:57
240325-p679hsgd33 725/03/2024, 12:54
240325-p48ghabb6z 125/03/2024, 12:30
240325-ppk3naae2z 425/03/2024, 11:57
240325-n4x54aeh52 1Analysis
-
max time kernel
44s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 12:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/presentation/d/1sTjsgEdfr9QFphvYnubacc80Ho22sxTBy1eUaf9KM4s/edit?pli=1#slide=id.g26b9fd9cc8b_1_230
Resource
win7-20240319-en
General
-
Target
https://docs.google.com/presentation/d/1sTjsgEdfr9QFphvYnubacc80Ho22sxTBy1eUaf9KM4s/edit?pli=1#slide=id.g26b9fd9cc8b_1_230
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b2000000000200000000001066000000010000200000003efb0c1054a3ac94612d7d85baadc77f79e7fafe8bb952f4afab6075b9be33fa000000000e80000000020000200000003dd092285d8568b21e1b4753b5fe333c2fa21fb3128e54526007e328acd94d37200000002b8dfff4189e2cf41d3e26f7e0d58be13bd51a3123fc7e1d01995999c00d969c40000000bf35dcdc57b7f88f08a1bec20753f69b28f7d632935dc4d455b7fbfe67cd1972477237369b9e1828d2a0e23288ad5eff8b996966be38628bc9330f0dce2c312b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d75eb7b47eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD713D01-EAA7-11EE-8658-D229E571C05B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 268 chrome.exe 268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe Token: SeShutdownPrivilege 268 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2084 iexplore.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe 268 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2104 2084 iexplore.exe 28 PID 2084 wrote to memory of 2104 2084 iexplore.exe 28 PID 2084 wrote to memory of 2104 2084 iexplore.exe 28 PID 2084 wrote to memory of 2104 2084 iexplore.exe 28 PID 268 wrote to memory of 772 268 chrome.exe 31 PID 268 wrote to memory of 772 268 chrome.exe 31 PID 268 wrote to memory of 772 268 chrome.exe 31 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 2076 268 chrome.exe 33 PID 268 wrote to memory of 3040 268 chrome.exe 34 PID 268 wrote to memory of 3040 268 chrome.exe 34 PID 268 wrote to memory of 3040 268 chrome.exe 34 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35 PID 268 wrote to memory of 2384 268 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/presentation/d/1sTjsgEdfr9QFphvYnubacc80Ho22sxTBy1eUaf9KM4s/edit?pli=1#slide=id.g26b9fd9cc8b_1_2301⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65a9758,0x7fef65a9768,0x7fef65a97782⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:22⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3292 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1508 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2780 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3796 --field-trial-handle=1388,i,14037307829655884799,6978803528985198593,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b789a717a3b65bd94ee31489f8d8eda4
SHA1e8adef47e8fa94bc4156c1f5009685718a6570f4
SHA2564ff526b7507cdc52abed11b7f6c3ddac574b8b8c4f6a412f0b1b03dcef8faa09
SHA51239e8077079f75da6b730d7ee7d597592e1ea454faf4a9d6447cf17450a3cdc0c6b1ec76d42cfdeb14b7fe74d614528ba9db3e2213b8206eabde520c88d0aa78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_12A01E2DD41364228929C51A0E5AEB57
Filesize471B
MD5c0c5e015253113329d587d0575e3fdcc
SHA1145f9e14656cbfeae46480652389df1912409080
SHA256d12a19d8a3fa7a3b05e733d9a577038fb4a2dcd9a7c5d1b3394f86e97b63f222
SHA5125d9c33d385e8c2356e1a4ee308380f8e80f03559ae83535dd71644dda652a888acdee5f6c00310f694b4b7d8f00db52a644330a1c234c8a1cf5b92ff076733ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_97FAD8EBB31B0B74F135144564816C0E
Filesize471B
MD5886842194c823a326abb3426b97e17b6
SHA1c2858a55d2ba0fde554ba7e12397546f2c443dbe
SHA25616cfb3b74045cb6017a2dbd97060f0fef034d9388b8cc05d03dcb3b28bd62a87
SHA512ca2c7911072d4f86d716fe71f108e6330bb24ae0e3fd6a33e3dd6a4714268b12b42c035bfcdd3813ea7a261afb20155dcd7ad61dca1b53ffea8caa3c5e564fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5e7aaf805136cd08939cee4e920ad6d29
SHA1d16d8cb4dcbe7db1be8ec683cf9546d805a6d5b6
SHA256102ccb2a38bed91a84ca9a645a66a35ecfdf4becedab4c92c26771bac19855ce
SHA512803d6006dbe7b044aae19923f0ec02721bcf8725b6958759cbc51cef0251872d53d84e37a13b7434009648bcb0bea5eccc1c13bac81cae9cb97f5e9ae666508a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_12A01E2DD41364228929C51A0E5AEB57
Filesize406B
MD5e6b7e6b48242e727e0ab255ce9a0c0ff
SHA130c09839aa6a103e922b9511c60dff4ef42f8734
SHA2567952f54219229520a45fea7f9adaa605cce4fc9823ddb5fdd7c55283e9870b24
SHA51200b2ed5a27a09cf4e02944df476571087b5e66c6bf300fc32eddf5c83c80cbe055db8f6619a2a4e94407bc871bf6cc4c67c3efc1693ee37a42f27dc498faf3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0131e1342b6c917c9f78d46b9346923
SHA1c344c116889ef249f0ac01fb672dbfe9e3353390
SHA2567b1e4f1d2e1e2f7f654c7941b27a0208927da75f897abe49611fe22b4ba71e05
SHA51281f97853ddb9611f789093c4996776febd5bcb1eceb92ebaa974ecb9b8c8b5f45c13380ffeed6edfb91aee816144c4b0dbbea2e94f571816691371855e77c34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162bb25c6fdfff840b4ba78da95e0964
SHA11342405f752b1e131041c8014dda1783d6039446
SHA256f6cf0bf7ffe3f5628fa89467ca097c9ea140e0aaa81ee6acabff5a733767226f
SHA51299d658251db34578d8026a2249eced10f87791e91bae4fd6c0176f83450599681a7397525938823561445b2b4f9da0e5aaa071975a5df5be99808049d827fea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504295811eaaad88bd7506a3c953fe88f
SHA1b63d7c4b2327bcdd727b1e6d801283998215c43b
SHA2565c539a038c29acd2c1b55ad57a1fc33ba5197bf3a21adc5f31e9b3ea32c52f54
SHA51284f4b19d4ea5cbe52ddf09bd3c10012cc75e8987613dfa725acf736085903b4271ecee87568cf6845bff15339dc3a0028f75019cf139cf871da5c2fecb7bd39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a95d0b4b3300216851f8da864de63f3e
SHA1c2ea7527b1bf9b83a12da622d88fbc839ad00a9c
SHA256495e645e010fd5e772a6a7dbb607304d5f2f293beed513776d3992d4d3006faa
SHA5120e337773fefe61acd21409aeedbe4d0f95772d7552600cb3f8bc3b3663f16d5ac6bd49f2b63652583995aa28ebe4e7a89941380d6e7db7913bc9bc799b9f024e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb619f89f10e1afc82dbdefdf7e37826
SHA1cd82d32f563ca6baed0687e4d32ce17b18b00259
SHA256717834d679ffcdc9a9e7a022c4f3eb38b61b51c861ed87a5733c8f06a2f370bf
SHA512f8c631c3eb702f21b221343d4b34b1b45ad7a7bac8450876fb41a538adf548c031d55b3688b78ad9d3cea27d0146a868e40fb66ecdf643303d9a0b07250e9bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a3fcb22ff420b6ddf08b41571f09e4
SHA1bb40acaf3873ae030c8bbb0e6a1711022f81e4b6
SHA2560b83c370474ff0ff1bfcf48830f70762fb32dd1e1920a44e52e7d6c00cf44598
SHA512f33e0df4c2807663419caa2fde681a0091731c6b63a1b0e633c4fac2bd81c9c8caba1fc0dbec3dda710e927f9c02d9d2be060a32640e893cf58493ec15d0e05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55abde5db4a31014782e43b797c35dd4f
SHA111f1c46444c84622de811a90180a4cda69d02511
SHA2560cde3599c401aec3a59280ba162ab063d9a376770a88242c560fceeb6844778b
SHA5123ac4a4914ceb5153749f781543b229d1f7835afc13b46a54de6a2d92fc08db6088a5ca2fd2980c94db2e1450cfcb2e3fce4029452b27c7fa175bbf86505b2668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1863c1108158c2c8325ffa8bd440c4
SHA1e00c5d5a49fe9306b0040547c79bb955cfd6c537
SHA2567258f4cff975b8f6500fe80f86d91a1f38e2f3fe22e750c1f06934323fbd6c56
SHA5123b89b330d9467730cb15f684066e34e190deb5cc2ed93b664b808fdc20d510725973481dd8b09caf7593606e23688890d8b90e34acde8cc70c70cc79f3e06860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a642b3b915be7325b87550f7c65d7d
SHA13b9b3121a980681efeadb39d300175f89423ba1c
SHA256fc785436ebc45ed4877da7724ae8df27df171d13d3b787a4ead22f65cfda8c62
SHA512e3d0749ae320645cdbd05e8be4febf34983c8143f6b6bdbd11d4c5b217b0b532aab28c03854dd1c13ff972b9c27ae1bf3946968f2ef7ce95915f9bd44517b71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385df273f773c8df8466211797c97423
SHA1c6a46551751de8063cff73c204893f4c34e51a75
SHA25631494eb06e7807c3a769e2e8e07d87c453380676fca4a93df3d4fd2400190f94
SHA5127c7323d8477b0d94aa3896f5541a42f0b84479f9fd389d7f960a9ad3f39d1ab7f118cb3301d4552dfd926edfcc01ab6ad951ac7381d91e6c869f9986f97c7bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5409dba46ad3171fc4804916ca51de111
SHA185671a1bfa2a8542bb4a5a3bc0f4839e69458e89
SHA2567fb2d44572c2b0620576c1488b95d695204e9b7535c24b72c55212f40f48a8e7
SHA512db1315fc819268a56ae9f4df672f654ed16e18cc20f7d26b5ca71e6471a384c321e71beb1536f14763a8ddc4368830347f54d2fc4c3fb82f9cbb1570bef39edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530a9c76bf9a1262645e955e149b1ff1b
SHA136348392a37c3565a69793782d82aebf6877fd68
SHA256dc4f9ce392f27502ced210c78e619943f5005d844d369309edc5ddf490192e4c
SHA512cf05f7df670f7616913ba3b3c54f95b828d64fbf74e60089cdc07f957955809f54cf85f898aa4ebb97437610ab25991438277780c0f658e611c9115750a7627b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5422f08bc139bef2ddad20771ced9a4ad
SHA14936013981f7e6065ec413c533b020cda1396e1f
SHA2560b4254b0cfeea158bf2f82d9506fa56a48be0ad35a723bb11684c755c96d75db
SHA5126842e9c80eb6bbb7fd565027cf41bb5462be818b3d10c2f3421cb331e24759eadd54f9ac3f3c7847015d1c6f499a38c829b3318f40d7c7dec8947879f21a08ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530cdca9e072257cf681170db47cf8e51
SHA1e69e5f1355905eec84bfcdc55e96eba5922748f2
SHA2566eea32eb19e5a700704746b840c1bf9ccb40b4e4ae05e49c1aa4f128e5700c91
SHA512dc843cbc55a7abba11f09b4276dc8a28c87cd5e00d384f15c8d153e33decbbbbaaa52c88f996ec12ead146904bbd911c0be26da5fdc2683fdc4016e231ba684e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58108d0b1bcb87c69c1c709aacc959167
SHA150c202a2181b633c9f570042dce69394eb6ae905
SHA256b0a59e1d3ea66049f9e77ca6f40adc0f3b45c4c9d99dcd41b26e378cb899c46f
SHA512ece1620169e6c7f6ef2dd4b8366afe8e04a085c73b5d5406b4714a3044971ecab6f748585e347253413df7ddb73e2ce0d8b3c36bdfdf0d6b9f42d83463f93316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_97FAD8EBB31B0B74F135144564816C0E
Filesize406B
MD57c4d847233563f4d2a71166a8bae8a7d
SHA10843ff3513ff8270a907a10a778ec30d4fffea4a
SHA25676797d1fd8c5972fe18c8315ca248bd780213066c996e5edab0e4a7acc9f8d70
SHA5127e09f6bec62fa6583f2decf2dcd4e9cce831536da4735ecb4d4b838b96b11224bb12a69bf05210a756c666b6c40b3c580ac69187fc2dd1b8f1b5bd4c15c195ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5f8d344fd2f040db4c8ea56874bbb90fe
SHA1a7ddf950c958c4d22b7525943e699a365f493737
SHA256ed30fc872961d1117570c5a2ab826e30239bc43f4ea6d50b5a6f660f807f8ef7
SHA5122eefd2f956072d4a7ca12f67081e31bb8f3eac5df31e04358ca4dbdf034bc3cb8d66998ecdae46ca44b57429c2ba3c8c5bd15bb900ce73f17a8f38a1545c8eca
-
Filesize
197KB
MD55e28e72b443ded036a4cf369d0dda3bf
SHA10500de4480a54243b12d096745c6ba04c9479e66
SHA25615fc7a054efbb9f76d937448fbb4814d7b3f25a6d137e24c1a69e32947eae71e
SHA5127d17a5248e54e4dda8fd17a4d662edbb274629161a1e25b3b7f7f5112541663a5040788177268c53b2c78bc7e6d2204ccfb342d93c2ceec0a12d8a41788c088b
-
Filesize
168B
MD53d2f84d99b00b055267dfab64c1fbf4c
SHA1ba08864f72140d656d2d89fa9a1a70f94c431a46
SHA256849f46c1d4ea2fdeb47c41a0caeaf2be8ce2195e8ddcea5d2481641289c1500c
SHA512a5d78a63e1edaf189715c9047ef7b70b644f06357ba145cf7f4f6b3160dee2a4b41e766d7f45e6759f0d81d4b7d0611b767f6c7f33de105b2728f2570f18158d
-
Filesize
192B
MD56b36dbdd7ecd21c85c9ce745d88870f1
SHA1d97b420058f8449acb53fd0db34a3473563c7451
SHA25635f2684fc50f1cfb63cfeb1030a64af37f5f7f44de50e5df6805722e0b49ffe4
SHA5125251134c1aba514eef21c29d07837ce4c67671dd4cb2d4e1ef0a84f49137ff004ea390cdc0f5e9d9e0914c207fef980e8dcb5a83b4224edf5058fe521b193842
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
986B
MD54e174f8b84805b6efedea6fa4fc2cb38
SHA1afeb7037e32537add70b5385d3276be946a9dd0c
SHA2562e294aa5eddbd986b2cdede53e6b6d5bfb713bd121a4060a6140f69b55c7f916
SHA512a23d146117350317491d78142bfe22eceeab5228c8b47bf62719ea0114abf2a0ab351c3d67a52b8c12235392c979c9df2e57e03ca7886e418b04d5ae6e205c74
-
Filesize
4KB
MD53b6bd68f344c23418ec81dd63592b40a
SHA12b18baccc5e4331812ee5fe1e1e72502938b7058
SHA256c88d34d09087e20f1b230e8a4cf2b1d4b26d0b2511fbc3a348978315eaf4a550
SHA512e6d4b6b388c35e62ac16a2d907a0b872ff426cfa3bedc2d38fa878182663666ecd6fe9edfd6ce86dc625a421e66284ea1ccd04b412b942a71e37bf067f974c2d
-
Filesize
4KB
MD56fa2fdfdd8adc8049b793f16d174707a
SHA178c0c9446c3632863d3010a8da34945f1da9033b
SHA256a422e66ec5f19c47a4bbebfd6900e7108ce77dc593447c56d7ffdbcee3df79be
SHA5128d4cc83d1f5b3b419dfb4970a1e306293086aa4bb92f7d8c6c285315d78c6deebf5ec37cba7a7d9fc768fa526a40ac8ba88e8b84faadeef50212bd27e52bbdaf
-
Filesize
4KB
MD5c41cf9b291c1b3850a50749fb3b988c8
SHA119f02b2b2642a688df6fc6ff958216c99536a559
SHA256835fa87995499c9dd32dd4cbc61ebbbba2565f777738a7e71f5d703c4f04cdcd
SHA51240e9b23b9b1ba28a322d842c8b660da72474823e11a7a4b94bea19d7d2996a48e61716c11de06de6b2706817b3ec234152f42396a0ccfe3b10fb8b2a493ab453
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
5KB
MD5c3b2ea3d66c585e5ef440f56f079b777
SHA10aaabba35c273fcc543117715dc7e5be603b2b7c
SHA256ac29e9409b558a532b91f2a9f47e528523bbced43de43a058da68f3ca09e10fe
SHA512722f3807baf560a379326e9a3a877be47f2c356da2da662ce2bd201df2cdefb2c31f3b6a00a72272e60655e04e002b0bf0b874ce9307f3283fe24e2be022673b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MUD2YH56\analytics[1].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MUD2YH56\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63