Analysis
-
max time kernel
53s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
member.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
member.html
Resource
win10v2004-20240508-en
General
-
Target
member.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A881C1E1-2996-11EF-AAE0-7E2A7D203091} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09b927da3bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000005f019a47a77f64aa04520955daaf46e7ad4f77a773103cbfcaa9211349acd476000000000e800000000200002000000026cccc9f87926b5ccdf31f1f5c2512e90ca6e56495b680cd17bb41e0530a77942000000065c36b8d8af742cf5b191d452210e690e5b2d74f87935ce1e92433f9614a14ff400000001048b1632329ce11008319fd3efeb62af86c65443b8ae1858ff7ddbd9e1f9025aae9b08162ab421b331353c658ac2893c4e8556fb8a534e55a024e3662471070 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2800 chrome.exe 2800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
iexplore.exechrome.exepid process 2500 iexplore.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2500 iexplore.exe 2500 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 2500 wrote to memory of 2140 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2140 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2140 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2140 2500 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 2808 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2808 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2808 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 920 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2468 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2468 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2468 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe PID 2800 wrote to memory of 2764 2800 chrome.exe chrome.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\member.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef69a9758,0x7fef69a9768,0x7fef69a97782⤵PID:2808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:22⤵PID:920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:82⤵PID:2468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:82⤵PID:2764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:1612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:1508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1244 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:22⤵PID:3036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3236 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3544 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:82⤵PID:2372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3668 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:82⤵PID:1120
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3560 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:82⤵PID:948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3656 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:1640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3876 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3848 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2696
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3896 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3260 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2160 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2228 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2592 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:676
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4056 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1648 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:1548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3540 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:1984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=2348 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3408 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:2516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3796 --field-trial-handle=1184,i,11909102296654907988,4510487659850850051,131072 /prefetch:12⤵PID:916
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3016f56b879f9e48f7a63a6a025e1c
SHA1cb6acb4a85334ad77ee341b8575c46a04047039c
SHA2569fbd57d71d540bf41b51093fcabbab8410fd844ddd52719f3c73c57b4fcf38aa
SHA512e4a5cec627b9d504d9250459f50a865d3dbd24619067b13d54379ea0791c9134f955d6d72d84dff6404090e91afa2a8d7203105459f9a6fc9e1b3d33f26ca4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89b26757db8a6aa8b5b5e22becfab27
SHA1a3b626203e6df15db408a27293ace7d04934348a
SHA256cd3663ed6bfe2bbfab0fbbb09d2017d52472ff35136948cbb4883c027ce7f834
SHA512604cd265f263b908d9d11af7be6d5c14dd6a5b5e10ef9b325a42c42ef09e95bfd097b1ef99d9031bb1e3bed83730b8d874b4ce06288bf57761cc46879d33fda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b44b33e9ccf8eef7b16ff5f5a88e2a3
SHA10a670bf143b8853b4df0bf90aa8102f9bd319ddc
SHA256682bf22b186be33ac630d0a30a22c1182604b58b44257c587a3f5e6202a2dbfb
SHA512fbe3f739b483c7639e18db36577315ce2f914c9da7c5a1cff0141eb187cbe314699e4d9cec1e0ed3df3dfde3819c0fcac6db87a57615688c89b75bff3f4315ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c86bfd690d10e3c9bb7949e8be99df
SHA1b90ba2a9ecd45b504afd375ce3bde43fe7c76685
SHA256ab76fc8a6cdc93fa380a98c481b05011a558c9cbd057ad46e93fdbfba642441b
SHA51262cec9cbc80bd22f4f0cec809808ced35b99862ee72cdff85c7799d04aefbd407d0b00df7708e1a07e9bd74cb1991fdd1c100552089775afab6fc85de946c0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c889c7e73119632fc50cd3b5e195b5ba
SHA1d00924968ed35c3a22a65361713f62b230baf579
SHA256b089af5a8fe9d7cd42f5263990f68ecf41a326915bfa5fd3ae769046c961f3dc
SHA512850d10ccc72dbb5730fb6532c5ed434cfd07d40f79dc079cb4b1e8a978d34f6f0aa255fea018448777a4e33668e9522c41f04861fe5632354022c0e5dd7d3d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af171b138c182f9375c77c608fda4dc5
SHA13a0e853fc53150055b307fe52c81a332f941e47a
SHA25679f84badee1156a51c2c44810929c627dcf5e2cfff813af8624709996b86194f
SHA5123a78a7f45cccfd212f5770385b6e404c759dcc4bb212dedc16c87e3c47426665008597d52dab07968c1ece60db26f4b246743392af913367c644cb0893540e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a6b0d408720f1c026d4299ce5af620
SHA1b0f234830a06299b8b0f9b89b58e452390165051
SHA2564bc34b9db1d1bf928d4b10dad1ae620dd88e27be070c58b822b3122f65d0a0e6
SHA512acf678599eea0aff76229aa31839c5824a43827f7814ea4be8a4ac636b01c8a8bba0243467685898a9487871497d822f399fca43bbe710b931c3e832e65231bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662a9ad48200ef4c131522a6201f8a26
SHA11a1e0c0e7edd072d24bcb40a16889bde6c04aaa7
SHA256b77c5fe7638c471f6c2c7431dc30b0646412174a41a39726a90ea084613e5b1b
SHA5123af88f7442873337820b9148de954aae979409b0d30a6b7bfe2c38eeb14c2731a46e6d95b521de6dc040058fca1c0dfd3181bb0ffaa7dfa182db62ee1c686119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428c13083cfd4f1f95c83de698f4cfa3
SHA128a4ed3011a859229c8227046700397a0663fb6c
SHA256bd5920b9961a408582b59e16e7e6127738a1222104cd2f553b77b86c0fc561df
SHA512ec74793c9366f1d14aac7f52e2ee7558a921546d254bf8404a345da1e658fb7823db45511cd3492e9f7142f33115097a24a11a4bcc4785af54b6a30a6939cf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561bd3ebe1e6c7551156e614ae219a4a2
SHA18ac35890a9401f6ae7efd459f29bf8911f156882
SHA256ff8fa27443b1e48d3fa9282bfd76d5f53b1c7b31ad3f11bef7183fa2dc93510a
SHA512950bf6fc5b2f357859e0735bf17eb83b244977dc69702d9ed13dd6feb86fc042b15de89ffc34c31f35d4a9d65acdeaaa08bf444f5d35733de071fde28aad7f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50206563eced4722da4950ce05d84a9ad
SHA12d682bad579296330c4f0399cd3574ca4efb06f8
SHA256097d339c34185f2c130c21ae433d62630e4055f6ebc890c009ed31e25b535a6d
SHA512ec8355775650c3f7d62aa9793102e80c6cc9eb48d1984d04705e38a8ba6d6a981be52bb0118587214ea051471f66af67709ea04f7f275a654b5d418101abd421
-
Filesize
203KB
MD599916ce0720ed460e59d3fbd24d55be2
SHA1d6bb9106eb65e3b84bfe03d872c931fb27f5a3db
SHA25607118bf4bbc3ba87d75cbc11ddf427219a14d518436d7f3886d75301f897edaf
SHA5128d3d52e57806d1850b57bffee12c1a8d9e1a1edcf871b2395df5c889991a183a8d652a0636d5452068f5ef78d37e08ce10b2b2f4e05c3e3c0f2f2230310418a8
-
Filesize
1KB
MD58b40fe5b43d2589e2894ceb5fcfda962
SHA111b18529537e7105b74d3bee8527b9740499a57a
SHA256a732a935b7889a3860ec998002a9c89b332eebb28e51e99b23bbad2b37745e6d
SHA51230bd02ab47b9416725f618e0bf6bcb8f53cf5500bbf459b859da0965813ee510900bb9f3b44461ea13ac549b280c9f6c53d688ebf5b79d86c2b8253ccd5d3eec
-
Filesize
525B
MD55deedaa18be3b09e844345c10d71bcb4
SHA18866bb61c77704d6882a228761b8990e2eee26c8
SHA256d5498cb59bbb31816a73908667f20ca776166f43bad3b45e6030b3e226101660
SHA51264cf559d6ec6de2b849694149f7f3f077a3981cc091162d6606198f6182a66c41d8daac1d75ba39f5bc8f8bbe3664dbf061ae9a80efc849b0613ecaa3f74d78a
-
Filesize
4KB
MD5be4a95885d19dc4fe31ceac75428bf20
SHA1a62770c18c5d5e4ba5445de1265980368d4a374c
SHA2569aff2b53e9f8053dc8e7f0058f84daf028fd47a07bb1991d51ad41232bf26844
SHA512032e713dd91aa74dba67831d1c1100a1db685784319b889a6242a0c372da97bb39b2d1947e5e6ebab44e1b86f9a4465ace075a856e5cfb8314b17f9da78cfdba
-
Filesize
5KB
MD515bacbaeb2e7f0d9867547596fcbdb36
SHA15cc643287d994dd00874f3ccbabab511b75983f4
SHA25627fd46635bf89b323eb9484178ff36e54f76a140b8750c1a678db1a507383885
SHA512c2f8895e5250ef23624cae331497392f205c79dbe125f0ad472b9af2385db7a236df523e67131f766782b670d94e1e11a5e7b47317bb6f55e6875c25ccd28229
-
Filesize
4KB
MD5006e260113ec561a9d6b4390038ee54e
SHA162711f8935cc992d58a83e921646ae4de527cdd0
SHA2568a15a6c164f314db6b0309762d454b52f0e23de0f07bab855440e6c6fe1c9419
SHA512f3c7e9952eed3e51b4529711d344eac365394f2210c3df3fd1f36a88bdb27dea5d1bac880d0c80f3c026332e098032f32e7ad54198ca3fbb7b5e0c08a885d3fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5ce3fbe3111c134220e7a3a6e69165d9b
SHA1c5717e2768ba86420b340bc4343828863c68562e
SHA2569295034fd36b31e9058e4362e747bef90177227159eeb1126c1033d2a61a4ac3
SHA51226f59655d76945ee10090875ad60599fcdb96dbefde5a3bc6fafa0f0ca0fd4e245ad54d12e6e0294d4460a89bf14b35ff41be4397e9619d08d4e3080ebfa3952
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e