Analysis
-
max time kernel
71s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
player__player.svg
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
player__player.svg
Resource
win10v2004-20240226-en
General
-
Target
player__player.svg
-
Size
576B
-
MD5
d073b3d7ac1237b3c90cfc1890cd9151
-
SHA1
b439594a856b273adcad2b47888577c807a394b1
-
SHA256
562b94da5d9a3d38112c4995c30ecad872efde9318129a6169681d5872f46fb2
-
SHA512
0e35f52b5358aeb8a4c9d4b0b688e83ade73db9e33599dced39b2d9d197d59cf74d39c77814e09c79a45e4c6297f8427c903c53ca22d773d9b314b06d23888f4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05cfc591688da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85102981-F409-11EE-8706-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000005cdf2ef70f7673aa9548178750526a045f056dd630cd0d5f96bba93ddebe2781000000000e8000000002000020000000994ce511be670f954bde9a5d8d67acf9f063be562598a86570e29bf8c255405820000000b12daf1e452989c36d440b6d6f5e8bd91829d0a3071c665d93361c31906a4a3640000000bcf325261ba020fe7164ec056331b3c4b317f98eafd6b76338cabb2a0407c32e8b89603eead6ce35608366159e41361edb2a7a9da153103c0ce00e583f38066a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2168 iexplore.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2748 wrote to memory of 2236 2748 chrome.exe 33 PID 2748 wrote to memory of 2236 2748 chrome.exe 33 PID 2748 wrote to memory of 2236 2748 chrome.exe 33 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 2752 2748 chrome.exe 35 PID 2748 wrote to memory of 1984 2748 chrome.exe 36 PID 2748 wrote to memory of 1984 2748 chrome.exe 36 PID 2748 wrote to memory of 1984 2748 chrome.exe 36 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37 PID 2748 wrote to memory of 1948 2748 chrome.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\player__player.svg1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5a29758,0x7fef5a29768,0x7fef5a297782⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:22⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1160 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:22⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2240 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3880 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2700
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f747688,0x13f747698,0x13f7476a83⤵PID:2484
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3496 --field-trial-handle=1268,i,17807807490690740008,7523826067245973609,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558fb62dfcbd5a83bdffa7667aa5607f8
SHA17a400daa9f7e19d0f3d47c28d61d6e042fe12789
SHA25608cfd0eb4057315734cdf2da4682779e152537426d1bba70471f788edf1858e5
SHA512d4458236f31853a8ab2665e0aa51b84a6c44747681f9475f698c742be9504647def631051dddcabce80542b6989fd48c56377ae9d3bf901767f3ab9218d257f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d22bde80f0926f76304b0c8eb66b8c2
SHA19a00ebb5f262ff181e2128b56e4b0ba7962f7710
SHA2565c79a6af6566e5f2f534c2e2b4c0289f7e307cface0ac2a3de055a74e1c83ce7
SHA5128cf7b8e11f155688555b740f4c1557ad673b09f4481f196b61ee199fb87ff5d54657f5ce90d9c56988afd9638383872d74bec5ef35ffa756b2e90432895a6e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cede202479be9c27ef501a2c8767914
SHA171bdac8364fdb32578bbac43d6d598908d065ad4
SHA256fcd97706cb9d70a75d998d95de3f13add0f61f2b05fff198855c1799d947dbf3
SHA5128118dcbc1f2a915a9f265b4fd238c83505de115d9d6d2173f546212b4e758b8ee5cd36bfb685a876a792557f2fcb52fe77f902d7c8dcfe06fd3ee1694abbcf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d8e622445aaa5617a9fe09b2a09dd11
SHA1a25f58ea52a0001a2be0e343305ade928e205106
SHA256684323616bd3fe31b3772ee09e5f0c206770340a68dad234287e96319b0ddc21
SHA512e382311ecae243fa3121322fe48894d31e4ed2899a5b532c384ea2c966d086943f648f52cbde99b982a1cf5a9888b284c2c658fd2cc1e98f6ca03f8c7d3f397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f82658083fa9213f708e68cf9505904
SHA1304bb93ec7a7b285b69bc9414bc41437d3a0180e
SHA25610c4ee8e69e2959ae952750e1bb68e4c21ad27ad9b5834f55d441414b2511e29
SHA512ee10ed011aa587e28901dff6c3935a9e6e89377dc7f4716f57df7eb2675ea4e36406a8710947663579bdabb7a951f3d7b20a4e832b841049540f3955dfd18d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9b77e345ca3f649bf40378e98868f1
SHA1de4bc2678408f7eef29b33c0d7b1f2ce8703c64b
SHA25651ea8a63999a0c6a4a4958e446f49fa0449d9d3cb6561dd00acb22322c772fb2
SHA512992810d9a23196f9f7a628aaa330e5a03e83b536761efd8fd42cbf706d85e1fdca24abd71b972c812f8cbab56debe7562dd9cef6726cc701853178757f075596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba125c26f908480466e00d10a5c31718
SHA1d75364fdfd34c109dfd8f50344577e2f1044c9e7
SHA25604c52975fb4462d6cf2393ad75fe7eccfd7a6cd10139d5bda07a5dcaf6c35fc4
SHA5129cccdfde62911af6e20ea50a70a09eda06ef5324dc105435c206d39264450108a2ec739336a4d7016140e079f49aa92e7f6569ab4451671e51a9157f5f46780a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511c0576fc6fb7fc37a2c2bc7a489b081
SHA1dff1570936b4716b95f2cdb4b26e290fb4d8db32
SHA256ddaaf2ef16c292bb1b10bd3c86c2a4a76fdbfed363fa71a90ffcb5dcaa0a7118
SHA512a1c0b076a54ce31b63a1eaab2799931668fab1d78a6ae07e233722a18af9cb0e6240d1c57b3cc730f7169a89378446785e8e123474b33d47220c4f5995d93932
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD502d43a202dc8d216a5b69837ec8a4a89
SHA1e88feb9facfb9784bcf935e213e22e485d090b14
SHA256574b02dfb5373185bb8a85aa750177278a7c560efac3a8bd764bcf20bb7e1265
SHA5126045f8c87e4f6c1a75ec55575c154bc05ebb91376b260f99a6a114aacfc4e013474bc80892346763bcf21a1f89a3490a27f585161a5efd932e68cc6ba0a43117
-
Filesize
5KB
MD5dcb46048ed2c237298af174f7d4b80d6
SHA1faaefe6b2d22c85a27f1d3ec0670e45c55f6d0ed
SHA256d6da867a61e9be3ae64a0a311b101ad3a3d96e455e23dd64c5d97902d85274b5
SHA5128e74a09f4d6592a256ebf51148b275c8c949de4d3fb63ad2bffda359258ec59f3c6a3d80679de8258d89125b548f0303e12963967e23b6cd3531c05b662e7add
-
Filesize
4KB
MD5e18b81120e816b3f8102aec3da6994ec
SHA15c89510058fb85be856a982b4f1871128e2c59bf
SHA256ed430dc3a44bfda6752650126cb9ef9e6eaf716fea50cd249e085faa5c464984
SHA5120fe82751f154e625344d738051a66d5153ad26285e74f4f997345c6e80b6c0eda077d7456ed744553feff4f6bb1b7e65dd5987a69362568e93989fa78ab67542
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
261KB
MD5dd1277e11f56bc94d8cdd8e12e03587b
SHA14b1b5ed06077685c3202cb68468b7dafcb337096
SHA256ce49cc401d0af3cbbdfe418298e51c8fdbaca42358f640a03bb9bd58c788971e
SHA512450bb9063c8c8cf16ed82f09b8abc15483ceea79104c73a10ca7bc8c210a766deb39bed504ee28f3e6c6a44d3b1d28133778270927a6836a5639bc2dcea9166e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
16KB
MD5e2dcdcdaa4323de453f50349ff789d32
SHA16aca1b1217b1c1f979a1e5077474113e5bb39892
SHA256be66dcf03ff518b94658ff207408c51f3488312299b498ced4d46f2bb0a1e627
SHA5120d490c2f5997fe2052836cddade70e1b26b7b192aff61cec64f9f69f439a0534936d965cd4507de05f9ae17a8809e8e988a65cdcfa0055d7e791c5630515904c