Analysis
-
max time kernel
218s -
max time network
518s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
rTJVn9.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rTJVn9.html
Resource
win10v2004-20240419-en
General
-
Target
rTJVn9.html
-
Size
562B
-
MD5
32ea59426648df27982e08cfe80f6455
-
SHA1
3955a5f179933b789090370db16267cfb4d20986
-
SHA256
143c6425d2596cb0f84a52e18192d3eefaed025b424db8d02668a972887bfc2a
-
SHA512
da509f86a93995a8e7e60135d8c17ff92018e84263c570f1d583e0ca92f307eff391b08396934834f05526804e36a11d042ccb7dfeff4a3f48f136fb93f95883
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE4D6671-07E4-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007ff7918e45179f13c98acbce3c11de67a31206758283401de9217f450bf90797000000000e80000000020000200000003b12d3c3229a5be79ca342f1d0ec23e802ca355566561cf07099d24d469040aa2000000095b32f7394422e0a55ee9746cec0e63a0bf7986d8f1f44af6ecb08ddfed2a7714000000087c90aad8a98593317f7fa5a2068fa8d485e45a9439921a3c5fbbcdf979e53f4e2093d5d0bafa7f586edeb1875cff2e68dcee019118bd317f56a8d1d16014879 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208324d3f19bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420748426" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe Token: SeShutdownPrivilege 1332 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2956 iexplore.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3000 2956 iexplore.exe 28 PID 2956 wrote to memory of 3000 2956 iexplore.exe 28 PID 2956 wrote to memory of 3000 2956 iexplore.exe 28 PID 2956 wrote to memory of 3000 2956 iexplore.exe 28 PID 1332 wrote to memory of 1704 1332 chrome.exe 33 PID 1332 wrote to memory of 1704 1332 chrome.exe 33 PID 1332 wrote to memory of 1704 1332 chrome.exe 33 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 2876 1332 chrome.exe 35 PID 1332 wrote to memory of 1892 1332 chrome.exe 36 PID 1332 wrote to memory of 1892 1332 chrome.exe 36 PID 1332 wrote to memory of 1892 1332 chrome.exe 36 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37 PID 1332 wrote to memory of 2928 1332 chrome.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\rTJVn9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e59758,0x7fef6e59768,0x7fef6e597782⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:22⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:12⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3236 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:22⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3248 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:22⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2164 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3488 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3604 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 --field-trial-handle=1200,i,3993366599944420172,3163066769614733570,131072 /prefetch:82⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545eb3ef10e159ed711d2d23849fd917b
SHA146cda5dd6bb4c1564fe825f58ca6b73a3827b74b
SHA256650aa4e37531a3492031acb6a548a02f585145278995a146a1296f373150c23d
SHA512b1a1ad2b461ff24c02639314a157a935c9157cd7503a4847986703f487e28bc4a9f9d86c773295a502a4d6db7d58ddae895c9e45bfa4e847a7fd47080f8ff1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d72e6566b8a55fda8ae90c79ec0ea6
SHA15ef1bede1b17aa750ebcedad7358cba194836165
SHA2564cf4d859b2035588ccfb8c286df1a6efae600fde9dac27ae882e4830963851b3
SHA51297e93af466f2e303347b145b4c4eb60e5a9fb8673e01d39b6267afdfa4c37b2cbe9532504e1784a017404d86900e574dd392ded5e42461518cf8f955b4442851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581472596b672ac7200511bc3eabec260
SHA18e5bdc5b5a8d3568236eba1413afec13fe1d5034
SHA256a42844e505e8f04b683816ab98e289f91348a7de975cff052e0b0c2260854978
SHA512884bf917dc1f8550c7a69165676db8624e562b05ba1588ee477dd1c86c6923629ec2a246ddd76635152bf5287a30f9c05d0b8408dccb0bc134b4b667c5c5db47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6f45885e33fd4fbb3352ad820cdf77
SHA10e0a64d019566f2b35fc5b71616cf9e4f0aa4bab
SHA256b09d52dfe0fe56790ec615b8765fd21a647ff192f947802e4c831ab4e03bdad2
SHA512652afa8574672d1eea0545eaa8e386f94eea952ec0070819f7cae6eeebcc47308d8f12022c3d705d2487461dfe8d8f4130d2d2943ac60238aa32a038e1ec31aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d171365a523af68e37bb8963a11686e
SHA1eb5624319bfc40ba90479d4531a5930e0d2111c4
SHA2568936240277c0b03ba861663566cd0dedc7def6f93e3d2e04073161ce5a28749a
SHA5123c68595fc52a018b5b79de8c16f910975af4c089b8df17c7d24bc71cd3ac98ebf380f0ce9a4df96d163cb225682dd974a28bfcf96d1cd48767f7222718cb7562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518dd3767503f669c961abdd27f6958fc
SHA1162b3e3ca35ebc62981553d794e6a94145e32095
SHA2565d861ddfb6a06567a9f50b0b6e54fd28222a1a17e77810be614140cd8046d405
SHA5122894da0b667a3dafa0426feb0eba427d5cd7aa23dd476b051936fbc3024152cd8c09651e59410652c1b8009a5cec4f1d4c2fdf68514122ee0f6a32ce0a43f73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fff564aa30391ff8a388fd41aae870
SHA1f7902996a33fd81a1b1da0595f7a13b8840d4a0c
SHA256399a4102ff4e88fa9302f66e6cc3a8e96060a8a2d588572631a235a56505ca0a
SHA512885ee85ee544b96a0ef191d7c62a3d04b9e35d333a907b5e9c31b842f4cdda2b6584def585d74a363e4a11061ed6db649e61f170cb7a9042e23133df052d8827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336cfa8aa5bd4e109fecb7ba0007f420
SHA12965139ec7670a374dbf02f67dc64d8461a58d98
SHA25657f448d99fdf3fa5decd0aafacc54b2487eb156648c98c3425606298b566f9ac
SHA512d09497dbba73591116c0a6c56279915ed03e9aff673c40f6d4403bdf6dcd476626eac441cd8cee9f52f3ed93bb9741d41073bcbd7d477fae9c738efc160b01c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5748d445a4943c628f614c08a70fd4a52
SHA17c45d833b9f45b6bd228339f62ea870f5e7d5c54
SHA256255209400fa7aa2b85f624ddc464c60b45057ea9b4e32d963527ec02e91bf387
SHA512d39c14ce756e4a5e0d13d7dacd58769c00accfffd69f9320c331f13d7bd4c0d8ce011c071cd6f2e4424deb9df094819e8ec0423013f7195441e8f0e3829e770c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e1010d9cae72b84542e8032328c532
SHA1b3baf3021e472ee412ae0a61e547123cb3458c88
SHA2567d31b3ad789bae51ceb57f3655a02dee5ffd1f7c01deeb82fd2e6892fdb9bb7f
SHA51227f698d1a2a0619d6eee7af460269f69e986df69748ff356aab2b133ab5eb0d7909c99a2bb2d1647ed87ef4dd25ca7964c09a36a7d57ca3f5768277b6ab796c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee71105d499a499115dd997a284729fc
SHA1ae970db27ee3af663b992d8b5e47be1635009b51
SHA256426abf37e44303dc2f591f015177637dd61e0437f9bb751413bc314abe10909d
SHA5125c0a48a689badfa3e651411d6666cf5b8dd67aca0bfca99d745dfe5e5d4fb49b12620412e54954d09ecb57152b76f707f4ef5637e0f8f18815473c7f20db6987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fbbae77b47f7b63ad8558bf29c329e7
SHA166b786ed242c028f9e605a4917b32c0506c2c587
SHA256939ab84da3ecef50180b50ec6fecc55bb629711d0bed09214ab895608c31316c
SHA512888086c957c9620f01c32e1211665732d09cb3687b603927350920902beb6acc699ddb2c9702f4bda44cd6e6eceb5625431b0d895189005c767f9da9445fa352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d312be1e1d168657b3a2870411413b
SHA1789adfd3d667e57b75c0ece271d925a369792ad5
SHA2560e014288c739de742d4d1b3d33108646f7e213025e203697463fefe36b0c72fb
SHA5121bd894cc9c327d232e9c4a076e71120e781620f1923f423e925bb0b19e39d6b4040aafd7a86f120db2607412198a12c6ad980052e85142224bc76a8c9ad38b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513bbc57402c2913ba4868406f02d779e
SHA15c6575ef8bdab044d0ec8069838a14137dfa0562
SHA2569609fafb00b0e06bf9ab27373b35125e0208a67b398de40c1fd1135ea2d17294
SHA5123f4a7c5b825b7d9f02b698fbcb5b7a550a2350194cd009c2eece8eb8b303727e8704f045a9dbb2021426d9ab39557f007487ef92f45f5dfdac086023c19bc6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7d1fae2ebf9988aa5a2023e77280e39
SHA1485947d48380efdd48e903b260c1552662491ad0
SHA2562f3c9a5db912c119adc639aa124db781ddc0012b7ff22c33ce4cd33132149556
SHA512057ec37a8431f11068f31a4f1a7f9a2148b4cd3f087395227f9b9112e7a55545303ad8fd233d6c60e72e4aa82098ea809aa8e8ab683ea3931382699c5b5571fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7245989e9120da8814f5b295405b2cd
SHA1cd5e24c028a53fe29ee22451fdec60b518ab59ae
SHA25668443b927e5171a060d6d0ccbea9e6bda6bb2e1693cebba94e7c5351831d2ca5
SHA512df7512df86b96ad9c721d176e8434336467f33b85853812ad48a412398bcf79ae81306baad6f7b0b5486b718627ed0b4e7c64ec40ec6fe6742f5048da08f606e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5479739aa6cc15e91d848f185b7b3234c
SHA1e69afd603386a636772cb3244fdfe8913763b474
SHA256e2a34a8e632569f6f92835dc06517dc9c0123b3fccbe0843dfddf886d81e3c7e
SHA51250de93b49638b3a236e059a1e2a1fc729b5e9944859b4ed16810bada0ec2304373a2aff25ecb261773eb726b643d2fb38ab74d71b75ce0a4c878a6f078be5b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab8bd4c309080f71c470e5e1844519c0
SHA1d92caa5c614a6169606335f0faa58dee199880d3
SHA2566c9bf391094ca2f7667fb1f0db1c01771587f1b78f67f8342f1471dde7e32746
SHA512a6b45c81503becb6b3d18bb2652d2f036f9ed48201ddd6e48b5fddbcd1d66a440e856e8e02194960f268284db3ea5a1c4c0a2617a60df2d7282c08e260d53628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecaf55f88530f5db760748984c3a1c5b
SHA12950be4763c6301cb3d85e48fbb84ffeb137991b
SHA256936f9f38f1fae5f524f8f92088dabd55df75a63253c978601d5d4c3e0d114aa0
SHA5126a173fbf9fb152be36edb39af9dda1fa354c4b0995212332eb07ffaa11f926f67d68edba8c5c4c98d5f598110acbc17f861040051298d8bacc745449d46f911a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5390f55bbdd730fa0252d62760a3db98e
SHA14fc703814121cdca4f4e84365341ab74ce01603c
SHA256a427ebf05f4affe9c0f5252fd539602829dfb38afa7e02f00cf2a7987e9d6139
SHA51273d7d807faffb4f3d3804b3b489926126413ad8cd4c19f52584eae214a685a0aedbb41901242b2d46f053ca444248f4e6f81ab27413e91055dcd0482d87a3951
-
Filesize
1KB
MD57c3201508ec337f66b0a34bceca42d44
SHA125456a55fbf1d83476e0af2d3bf961e4d11aae09
SHA25642762ce62ed741d77b2a82ccb14dcd86fe4901b1e52ea2ec97be5e4d2023b5a1
SHA5127a3a78ec3c342e1953d78a744e72bab71f51b71c0e524169870dd131ab12a5d41c5f5ed6a22b7764760eafbeea6de10fcd782fd898a01eb1134d4380d5298569
-
Filesize
984B
MD546f9a48d900eb092ffffd200df53098f
SHA1cc4117dd7de2bd88737d50c55d3a1b9876b12524
SHA256ce6285810350f63372468039d363dde90fc040daac3bb2edcb1b79b412e9a1eb
SHA512c4b59ff111f40eb6eb7cd1c97c19769ae7cd9a7751ca96a7e51a9be7f0eccefbc23222fc4623d995cd6baef721128cc6aeadaf6310c6501b42b21ef7b7147421
-
Filesize
1KB
MD58147066249669596ee5f13b1d75a6185
SHA120fdc004f6e9090a14d5d4ffb3964c0e0c3feecf
SHA256ade59cb4942e9844dc47b0e489e482ab6ef79bba4e9fad39d3e030d5e099cbbb
SHA5127cc669c1a91705eeb5bf909885232d86bdf572bdda38643f41ef1ea5e2a0dcde4d3838b55120b84566c6ec715d552576a32cef04a44a864c4c4c782a04d6c2a9
-
Filesize
4KB
MD58ee4b42e044cade6900c35050a598966
SHA1cda6263b41283eac8e9c66f0af4a0813ccb18045
SHA256871f9b7dfa07f26a3bd2c4acd28be4f43f0cd442958508dc4a8c1be2f6d49b6f
SHA512cccba84b40106fa18f756af6606576316855cd88e9be13ea8994a251dcad82cc2a79845fd90b0ce3b06fb488ab8a6713f8f2d06c2fba968b218d8da961c6e4ce
-
Filesize
4KB
MD55f18280b3170d320fc2a775f96e5ce97
SHA1379b188196ab4513589f125ec1383287761bae33
SHA2560d51035e4b281d51fef2fdcf52078ba8e5ab2c9e27471f70f42478868bc40e6f
SHA512bbcc72b7860c75e456082564c325d152a0d83086748afae18729cea04d575d6e2e0083e3a4649d657111e96635c210ea83c770c037e003c087c022f16a55ab58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a