Analysis
-
max time kernel
30s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
729B
-
MD5
85073f2b063c886bd31fd4c316eb89a1
-
SHA1
9392551261ed5dd1d2198834348307e77351110f
-
SHA256
f9f6b47d6e47b88d4bd96c9bdf027e8928880ed04529149b7bbe7c047d64741c
-
SHA512
566d63b7c7c239eb1895aea309fb01ecbf378fb942d1cb791765774d118b4815cf5e484142d4f4eeea55874916e30df71a002060d1c25122a5d307adbb79e366
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AB98A61-1D57-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2128 iexplore.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2796 2128 iexplore.exe 28 PID 2128 wrote to memory of 2796 2128 iexplore.exe 28 PID 2128 wrote to memory of 2796 2128 iexplore.exe 28 PID 2128 wrote to memory of 2796 2128 iexplore.exe 28 PID 1792 wrote to memory of 2068 1792 chrome.exe 31 PID 1792 wrote to memory of 2068 1792 chrome.exe 31 PID 1792 wrote to memory of 2068 1792 chrome.exe 31 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 880 1792 chrome.exe 33 PID 1792 wrote to memory of 1072 1792 chrome.exe 34 PID 1792 wrote to memory of 1072 1792 chrome.exe 34 PID 1792 wrote to memory of 1072 1792 chrome.exe 34 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35 PID 1792 wrote to memory of 2384 1792 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6979758,0x7fef6979768,0x7fef69797782⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:22⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1656 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:22⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1556 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3408 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3524 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3648 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1028 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2340 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2424 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2708 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3884 --field-trial-handle=1376,i,11755533978099723886,7984036149336094711,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b19a36203606a9eea3e5b9324cc0bab
SHA193ebbf1b1f775f206be4f9bbf2db40e59ff50b3e
SHA2568d335633582dcaed2bf09703703b2af8abe31e27c534f900d98defc445263f6e
SHA512153cf2e1a9abebc42cb4c4edd1b521a63f1848e436ca3a823f96c3df11601a72bb96bd66012e84455d660ca40ccf5484c04dcf62bb20bc77a08ca77c0f5f9926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705ebfb5c1ccf5cdcca6de801a4b7d7e
SHA19c83e1b7fc6f6c6a1c0ee97426ca1c8ba9a024e8
SHA2569883fb7059c8b7cb1d7baa1b7b66603ad016654116ca427bd5a5e206b1a24b4b
SHA512a6fb1163d129e440b9cdc937b7af74d1a72b071aee3fccba31074680a3726a6fbd8ba67a648310b6067ad23d578d3aa79037d7d8787e7684a6f89de595021ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4516f93fbb4bbda2d0ad97deef449f4
SHA1f4683b0c7a79a14e1669e4a49db2bf41499aa58f
SHA25635c5cd818410bf26d1a26d14ad613ea3a6adc657fd2d8114741930e4b98e7534
SHA5121f66a9662d5abbaae129d4f2f89e84ab4dbc3ddf5ba57ae2807e8a24bf062edc55bef6a8cd6e4f37eea1b12883ce0129e74582af4a74206d34ccb263e0cb23a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffe470d958009f21eab4024a0614e82
SHA18df743554d89487dd8eb73616e03cca73eeb886a
SHA256c0d4c5b1b77898d4cad0272fe056fd55c04c3cf1785fb350eb516d114a930101
SHA512d2d7ac9ea5fd3730c0da670c054141164d9d4c8e46b69a41af4630067a63a357a6c5f17a6707943648721170ea440a997f42fddf02ef0c38c84690d22ae20702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ddf4bca42fdc2b13683241597f2ba3
SHA161ab36ee04a8e107228e84ca7bbeebfdf6eb3577
SHA2561382baf842f0f67f2c27e4cdeb10a143745b628611c2b35de8e7f8af776001ab
SHA5120cf53f5ad120cb3f6cf0f5de07651c69ca8b789ab76d2dd399603ee0e1baf38e49f611e578864fe6e774fa4a693f3a60f3f739bbce8a844125070a92da86a2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ee85fd34884b40d533d5546f6e12d3
SHA1e146dbf4422b69ecee78dd77374c725011f0f0d1
SHA2561add29e99811b86fc2d0c538cf30517047fd0a42dda3fcb0f01843b679212a07
SHA512b554e82213a76a2640f17b6b8f7535eb273f61001db17bc7a3805fd9efbbadf4327ebe79ff2dfa80c0474a6fdb8954f7f167c856f6015f4a8ef80f6412711b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d346a6f90998c834a187824ec4e527ac
SHA1793cd8b5d57e098331fe0739cf3be96690fd2d10
SHA25639b81f6461e4398e1605764da27674814693b36bcc3436dc7b225b542865fa35
SHA512c435e65f413a282ff8f9bcc535893feba8cecf3aa736edb8cc982f622c975e6eb66a8a201f09392ef32509712fc69df6273ca7e278e5e335806ac9dc6385fe8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c07c4ed28b1e4b95b20bfcc28e90d5
SHA15860d690a352782e0a43903550463314f2a2b527
SHA2563d34ea7d617d2bed85ae8e448985fd9be8bc05275366312fdbf1b430a6db9711
SHA512e3dae04cba6822c71a8aed15d076431f6208caceb1335771925bfa55aee68135c937d7640403a287f3689f6da4886bae31f83bf01ea79e1936b558e4fd2879d0
-
Filesize
281KB
MD5acad20b597ea7790cc816a2e6dcd63c3
SHA1185f75a6007a9a7b33d308404aba3c244cd80120
SHA25603d90e4872c92dee5c0e5242266efa4e6f8e2b5e1976ca84de772924e35d0aee
SHA5129d90170013d95fa8503299cba1fd220557c95fe14f3d90f59675ba36835feac28ba154cb38feed009c3900041e42ddff2c8ad11e453ef6dbf5defc55383aac8a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5ad29b29b2d0d78e512f1b49f233d9612
SHA16ba50bcce3fd83aceee6353fb12add3322a6bc31
SHA25653af342b6e017f11621cfcd36c925d780b234372a93b844e66964c097d4dd70f
SHA512821faec425367d6824b9f4f0bb6e0742dd0fc28e5ae77c7d004c3cd79385c0d1d7108559b0b1c868560dbfe1f01065b670af336ec51e6d8070c6a4e5ad749a49
-
Filesize
5KB
MD56fd03633234a677d15e7515930512eb1
SHA118098b4e8ddb3a5e63bf8988debce3e6cb636d26
SHA256cb5cef23d7f089e3cd38e5cb6e62a623403006e15d68a7f4e4a88fb82de0887b
SHA51246b83eed476e6505ab16c7a2bd74fce2dd7d691382dd0e3d0400781ac8b64830d486a7e672bc86f82f8a695baba1a85e91c2de52156503e2a32173fe5c64ccf8
-
Filesize
5KB
MD5ac3193f777acab61f39531226deda480
SHA181d6a4d5e872fd866a129f595571f908992d0b3c
SHA2567e5242d3db777e6ea33f2cc3db49355fdc76361b8b66b6fc7b27c68dfd0a4939
SHA512a81f81d02367f480e2bdd4aaddce8a0ed0e78f99e453c8a86945ea36ce1a9e00baec93ae9ae04b5bfa0849f6704af799d452084382ccbfe4c97a91a4d7bb9832
-
Filesize
5KB
MD55a56a58a174f20e2848d1f809b37bc0e
SHA1c3c7c0c1810daf66abf10bd88a43694202fee672
SHA256698903e59a2bd8dd4dfaedfb000131789c5f152264402215fdd46001d695cea8
SHA512975bed67260bc73f7ca4840dc813bab2eccf56c8a95e5546fe8d0b6c96c8a982f50cda2b51294293d9b0790ee81a80bb7de07da3194e0d256f72b98314447bdd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
281KB
MD5e39a46e9cac395664b08a4368e7ef484
SHA1155b89df7dbfd473b3dd2275e1a7791e8485e4db
SHA256f9b2097e013e71539fb3a8dec4af0db2526bdd733c9d1fb51201eca396fe105d
SHA51201ca492bb61fcafdd2c70220b1ff01644df1458b919d175fcadeec1cd967de8f464a57c1dadf643d550315e799eb5981fd70d4e3944d9d10e87af6da5c1d7634
-
Filesize
281KB
MD519704ba92eb8bc29005b144009b4d62d
SHA1dab28c117ac895a0802d7364be3d23a3209e900a
SHA2569a88fad1e73f22a356a5802fdb36952ac73ad47a0bfc3ca4f0784182f2feb627
SHA5128a7cea21fafe2247daa01a41f4733e707c144e4249c4b357a84b404ae8a9fda7bd797d2f97c039593f65e89f7da6d660762484d566f39d5330e07cb6a69f77c7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5c6abb961413aef9a93033af6c0653c14
SHA15c275781abd506c73d955ea7658812256ce88117
SHA256f1d4333a0e53066e7e2877304ab8aa623f72fe8765fa93726e7fd9f41d9b0d0c
SHA5125745779f661e911ef946a2b7fdcfd256451709af0bcc14bca1c77ca673cf6ec68aa6133161bb56527835a65c53d06abb5e96501a5f57755c4f65bd0ee08842b0