Analysis
-
max time kernel
68s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-04-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
en.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
en.html
Resource
win10v2004-20240226-en
General
-
Target
en.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CBA8CF1-F060-11EE-A140-5ABF6C2465D5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418162503" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cdf98a168c5f414db298194f7964498e00000000020000000000106600000001000020000000e12b366392a9787dc5305e25c0566c36c4e9b94930a47abee7ed923a9572a183000000000e8000000002000020000000db30fa8b6b64f55f922e3312e08b7195ea2e5bd0815c7156abb42a03557ff0dd20000000941129650571e19e346cee8d7382ca426fd90f2ec7b02377b4dd01bd2e051606400000005df9265a552e956b2c64abb47e69561e0ae9b582abc73fae07450b0b050c2aee550acf32aedc6419ef3155635d14b7b5646ae573d059bb19b8886ed9bf33e2ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bc45016d84da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1116 chrome.exe 1116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
iexplore.exechrome.exepid process 1632 iexplore.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1632 iexplore.exe 1632 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 1632 wrote to memory of 2852 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 2852 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 2852 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 2852 1632 iexplore.exe IEXPLORE.EXE PID 1116 wrote to memory of 1132 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 1132 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 1132 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2096 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 1700 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 1700 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 1700 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe PID 1116 wrote to memory of 2660 1116 chrome.exe chrome.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\en.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6499758,0x7fef6499768,0x7fef64997782⤵PID:1132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:22⤵PID:2096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:82⤵PID:1700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:82⤵PID:2660
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1572 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:12⤵PID:1220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:12⤵PID:2560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:22⤵PID:2260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2212 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:12⤵PID:2536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3712 --field-trial-handle=1352,i,7411277313255436462,1154801628127677313,131072 /prefetch:82⤵PID:832
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2136
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fc07688,0x13fc07698,0x13fc076a83⤵PID:408
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c434b3e791a68177750f82463c018c0c
SHA1554384745363e9d703266afc2b52476db5295a53
SHA256ad5041ab4615333045edcbde4878fd1af147396a40450b888d9f4a840016e184
SHA512631081407a624c31a57a822d9ec18471aa128096f57f59f1a9e747a67dce71c436d83b7e77501fca3a0ffababff9e3b1ba76ad3151f504229b7344a4ed9d6d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ae512daeac142487675fd55b91f575
SHA1467b99042ff6cb6228d0ddc90fd32c4af1de7419
SHA256f05dfaf28aec9f16c95ffd354258181a4754eff91c1bc19ad38a59b8709b7685
SHA51238201e8e7eff7bc0267d6df7beb571aad12e420f50822c56ce359d757c27ff2694ce4db7f6d908865196a84ef0f24db894848104183f922e07404271185975fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f35290d3bed5710ee983700269dafe7
SHA1ecf685f8c9fbd5ba2476cfac386f430e0e84e5e3
SHA2563ed455fabbb345603bbe5ee2bd2d3484c8673335783cc4e3679d9de9b601df12
SHA512872173b3b227d700519688a871b3cfd4b394a992338c770afbabadba531d19c8cfc82573c49feefbdef30b14e7b0b3dbc61f403efdcd580c26cde3de175f5ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ecf7c3301cb44651f81e7786aed8e71
SHA1c29add75033a33cfa44b573fa73ea1ccaad8ecf7
SHA256077689ff8de708454c5cbab9dca71d818601d3aef7e7644ef57606fcc33496bf
SHA512b3c734c2ffb9e6d37b38e597ee65c54b0313771dfdcd3c0ff959426b88917e9aa5b15423f8e635ae5d08ac3583d5f5145739bb8e97194283e95903fdb5c117f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f487f8ff396050b016869b080f79c0b0
SHA1375a52acfe0ae25015606d28abd6cdf44fc20178
SHA2569a59368999ea3f11bd7ffbd5845f4d3954dfc61ec30b963e44a350b22b3e851f
SHA5123673bf7995fcbb4404de4e1c804d751ec3d03dcd30bc78b96674dd08a220ed175befd1235c4275ca39ab00b2042ea05d7e6ac41100eb224077f563eccd7affd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5215d77c000129840e5aa739e1149d96d
SHA1bd7af58dbc54dfdba6a127ca392f8f2c11d7e2a8
SHA2567899ed3efc4dc9980339b6d719e3cc71e368ee35e691704aa48f0972c6c42ee4
SHA512a6aa48c745fc3f0841a901ddf3da05c339ada7a512708b47a89043e7b9f31635f740e7ce1216f06de6a056e6c92429aacea8a49375baf52a9efeb4668ce40d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015f12927af400766f1906c3e1dbc204
SHA19fed9fc581e6ac665c0518f138498aedf1b56d8b
SHA2562a4f67c8fdf129b7696ea10cb3fa3f3f887fc78d994253dc9e2a8a7d91321862
SHA5125c7815fa6d8f28683ca839d635d2d5d8403973668365c75cef3d26fe1786bbea2f7adb6a72ff14f93ec4596d1413788622c3b036fd773cf4550f697acca5ee9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513bf91e4672f21575f1fc5aff06caaac
SHA19e41021b6a0b62270b66ab2b7f0e8bced4ee7a8c
SHA2566fbeb281ef738322602069ec43fc2fbce0937349768ba1d125b9cf587da96fc4
SHA5122158810de21154ef01798e7268197df25352d8ede9c5cc578097e905767154f4e5764c8e958011f01c68509f8aa0d1bcb1f0f6235f31c7132dbca31aabb23829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fd6b9cea45fbbd8b220b6f63231ca25
SHA1154a68df3b4b941eacbcdfe316561807acf6d3c6
SHA256c39c63ea01c80da616f2601736202e0f3f9f73fd6d04608917d342ea54329106
SHA51215438ed90d90f9226ce3420d10ae865eaa88f3d9493fee62717911c8a92b3fcfcb19c2d4b6f918562dde0ac024a1e3b51428bcd3f1a9aecad5f3105e8d8806fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b04ac9f1c9820823d798af20ddfec6b
SHA1d94eb19a08516ac81adb43c774988cd79e0dad81
SHA256db42c80d732695d5634d512aec967a96de165a3cb2fc519bbbcd646e4226fda5
SHA512c7ee218a2cebdde5828f5951d7ca5495e428217173379c8eb25f2cb521dc4757a29087855fd01263b99d5f5038177642fca250c300418feff86fcf206706da46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aacbb6da6bafdab613a028c60c895c9
SHA1002fa2bc6e4ce028118cd0ca1be4a708dbeceb75
SHA2568e015014fd31f96575e5d6f3b1a8b22666af82e41f90d33d88b7cc9c5b778b85
SHA5123da877b4f0697a00bd463e591db2ec181f4b5f93466bb53d2ebd678a5c2818397619823abf910dcb21386b879bb8af89725f3ed8ab85f77a95006a2d4acdd467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5030c403df29237c543c13e9542dc15a6
SHA14594fab4e992bd20d8db483ca4b717b4a7eb9020
SHA2567c73d31a7f83e8ce15383cc9a8cf280295cdc7cac284e30b9896622a78a84a7f
SHA5123e7501f7fbef3fde237f89f95c7850662293c7adbd9cef400a7d87a2d9d97854d6ed12b92a7e09514e47855f82aa1f05b5def2bc27ebbd9cab4b4054ea1716c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df08528bb8fd053506a1040d8d50230
SHA17ab0103a6b6c8555a926e7b790fa11aacead7f42
SHA2560ae3f9dc6fe0d79c350fc7f81c1b41771d21823b4c3a07acf55bc235de9a8c9f
SHA512c2fb8aae7fac385e091deb195f9fda8d42d2a43a9b5eaf79c6c2e4e3ea13cf2b4588de8eb822b329e4f52ed5111bd04e4870f96700741080b87b07b82799dc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59953e1ca35de33bddf2ad58862006ec1
SHA1ff7bea2f4abf05ca38d2779c519b1d82d50f58fc
SHA2564d7246147a5a84031e507dc23b6fff172834f2c03e8b7284c89e52e39d981105
SHA5128aa937155b0db70221c0c64f367a074e944d27bbfb1ab889fd77f7c8b5caf6f94620dfead167bbcc95b08924107aa4a599e3a044c3d1923737aa7db8c9b8d9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f7e09acc70d0882795c6743560d2e3
SHA1f100d48e5ec3e62046831cba242aa02ee8676fdc
SHA256b7e6c1e52a47efbd2347077350f2b6134207e5ef02597f04760c0dc068d9db50
SHA51294f2d8daeb1d669a07976e6a419876fffa45952e374a58bd165a7107a15b963333c85efab1c746cf79f5fa65fe2aa60996f537fc4149dfa89538449a24a1a932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b613a4f93fe79ff46ff70e7d76ce3f0
SHA1a85fcdb24568bdb5bcb3b3f810ba391e5b0bdc55
SHA256e99411e02204ffa24ff735bbee56e73fee3dee9256ec57ec810da71569bd37f1
SHA512719b8a9bef7967508ea6d70a2a6e373a094299565aa1426dccdabded108b5da6304e426c8766c3c6af2ec7ef4225bff0a1023616f55f7c6a1262745c967c4b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069f19443a10bf766c6135d861646faa
SHA170f7d1d9019c97a608badb906ce8b35f0e20784d
SHA2561b5be33463ee94448b070e1006d1a392e8e1e2ae015a20f5809d073cfaa8bfc5
SHA512bd001fe06c743248ead6737a9e8fe20199553a88d6525d9155b3b483378264a10eeff624cbf6323cd490358e7d131416106816b7f825d8ab381ed4b2a19e0dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1512156e16d7365ad3987dd8f811fa6
SHA189233a22365c4822e05289fbe03917478a5e6b9b
SHA256c34b7d38907759102b011def073786e9e18da3582103c05c21fa22f935e2434f
SHA512bd5bd4c1e5b45845cf3250cb3e0aa3699e0925b0fd12a04cc864a911653ce2e61b4213b4eed4325bf601b19d539badf114cfb3f9b57f5770e0b738d75304a3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a458b42e17761705a8f72141cb347f
SHA134ba93282156be782e223c880cc26da5d839e23a
SHA2569b1da2e437d2c142faedf3ca98ad458f0d4927e6b47fa0b6137fa6533407c707
SHA512b8b2c1dc6eca17e2d301db6c97f618a07d24a28e606677c496e261d1d647abe9d36e822f723afbb2c723b7a2772878d55177669c9e42a1ad5a4bf16a6029a3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54e0f40bc16de7e91bd6bc29c2eb80da0
SHA1f208245880a6e291e6236f7c20a3a1ded4b24153
SHA256c91241da08c1bc8fcfcd6f3705a599ffa729c7f1493af5fba86b64f8f6ca90db
SHA512db0552ee1b87fe1f20d0cca41bc17931a8ac2be492c1914323b5ed5d71aeb8385c03e83be5c5d5bc170e76bfd09907cc70edcc2740ce3dba246e26c354165975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD51ce3b6b1e3a5df4c71525339472b09ef
SHA1df9676f9ad41136cd0e81ec2378bd5d4bc72e4a2
SHA2568f16930b63021c4ffdbe974efcc8daf21a180737007a117db653c2f693bb64bb
SHA5120bc81a0fe681ac2ff08d48308a476aed651aa0b9ca1a2e7f64dead0e4ca85e499248a2752365358a1b4104da79f5b037711f2fc68afda8703ec1e678728fd5fd
-
Filesize
5KB
MD579b31c29021094504bb7edaeb897683a
SHA192a9e50807582620fae21749ce538369c598a9c5
SHA2564671988e532428d175d6b379d399b2d5447a6c5f65b6a6ea99ee592f03b3a0f4
SHA512f0a79f9d8c529d591b1879391e1f9b8338bb54df9c6a32c2810ee085a88395d3d773f2396e8a5df22e3cb14e42337ef4c2b6a802737dd1b411c606e346cebaeb
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e