Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe
Resource
win7-20240508-en
General
-
Target
24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe
-
Size
1.8MB
-
MD5
7ee03d405aca43ba9f24b03f3108bc86
-
SHA1
b9f464590e8092fb33c48b04b2b9b1830486d287
-
SHA256
24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6
-
SHA512
fb0a7e97e44581faddd112b1a8055ff4024ce3886d78b0fc431c94dcd9044892aa278e86a304a29399946430a6efc5bc48fb702a2d05c7286bd757412d1fc366
-
SSDEEP
49152:DbyTGNqduFU046PhnkB+ibfESFjvyZNnUXwpB+1h0oSFW9Ui:DMua9IhnkB+ib/j6jgh0dFwZ
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddf8740ec9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 981c866f6c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 981c866f6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddf8740ec9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddf8740ec9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 981c866f6c.exe -
Executes dropped EXE 3 IoCs
pid Process 2720 explortu.exe 2176 ddf8740ec9.exe 1676 981c866f6c.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine ddf8740ec9.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine 981c866f6c.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe -
Loads dropped DLL 4 IoCs
pid Process 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 2720 explortu.exe 2720 explortu.exe 2720 explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ddf8740ec9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\ddf8740ec9.exe" explortu.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1676-142-0x00000000008C0000-0x0000000000E30000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 2720 explortu.exe 2176 ddf8740ec9.exe 1676 981c866f6c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 2720 explortu.exe 2176 ddf8740ec9.exe 1676 981c866f6c.exe 664 chrome.exe 664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 664 chrome.exe 664 chrome.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 1676 981c866f6c.exe 1676 981c866f6c.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe 1676 981c866f6c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2720 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 28 PID 1996 wrote to memory of 2720 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 28 PID 1996 wrote to memory of 2720 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 28 PID 1996 wrote to memory of 2720 1996 24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe 28 PID 2720 wrote to memory of 2700 2720 explortu.exe 29 PID 2720 wrote to memory of 2700 2720 explortu.exe 29 PID 2720 wrote to memory of 2700 2720 explortu.exe 29 PID 2720 wrote to memory of 2700 2720 explortu.exe 29 PID 2720 wrote to memory of 2176 2720 explortu.exe 31 PID 2720 wrote to memory of 2176 2720 explortu.exe 31 PID 2720 wrote to memory of 2176 2720 explortu.exe 31 PID 2720 wrote to memory of 2176 2720 explortu.exe 31 PID 2720 wrote to memory of 1676 2720 explortu.exe 32 PID 2720 wrote to memory of 1676 2720 explortu.exe 32 PID 2720 wrote to memory of 1676 2720 explortu.exe 32 PID 2720 wrote to memory of 1676 2720 explortu.exe 32 PID 1676 wrote to memory of 664 1676 981c866f6c.exe 33 PID 1676 wrote to memory of 664 1676 981c866f6c.exe 33 PID 1676 wrote to memory of 664 1676 981c866f6c.exe 33 PID 1676 wrote to memory of 664 1676 981c866f6c.exe 33 PID 664 wrote to memory of 480 664 chrome.exe 34 PID 664 wrote to memory of 480 664 chrome.exe 34 PID 664 wrote to memory of 480 664 chrome.exe 34 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 3036 664 chrome.exe 36 PID 664 wrote to memory of 2444 664 chrome.exe 37 PID 664 wrote to memory of 2444 664 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe"C:\Users\Admin\AppData\Local\Temp\24304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\ddf8740ec9.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\ddf8740ec9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\981c866f6c.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\981c866f6c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e79758,0x7fef6e79768,0x7fef6e797785⤵PID:480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:25⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:85⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:85⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:15⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:15⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3232 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:15⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1540 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:25⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 --field-trial-handle=1212,i,11182847841338625195,11399655706914633221,131072 /prefetch:85⤵PID:1360
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
6KB
MD563d006483fa85545b1d19801ab04cc87
SHA12f6e16fe32d2e13d951c797033900408c38800e3
SHA2561992352460cfc55d28297865c4d73e02a8903739b187b5b3466e9b0b659180f5
SHA5129ce1ff222ca5433f12b690f0aab8db80389587741dd85287433e0e566336b71df6fd1aa8334c760711a54388963ee4a5b633a927af4c5437a2085ed3971c12e9
-
Filesize
6KB
MD59865fd4027a6e6fb4feab4f9592094e7
SHA12c425c7453545175565f7206946af4607a4b538d
SHA2567310bbcb069301c4a213ddd02e276af905aae083f106675638093bc00e8e48a6
SHA512fd4ebfcd610b24bcb2b46fa2de43685722bdd2db7efd71943b9a60dab23250509c51749b2ff0cc66b05a4455721bac19151859e2f43f78e2d6bb13379dc8f152
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2.3MB
MD5e97a92bda3e0fa17352c15cceb5c5dd9
SHA162ade664c0dc9c774995684e23cf49eaeaf23165
SHA256459f47d3aa8001b8151726c7e74848d949006a62945915c2a1dcadd02a29b8a7
SHA5122adec5ed0a453c6ab45cecb72d269d48fcca54fd5edc41f1414d3cebb83bca5fd19bf6a66f2635df1f9d451a044ebc900a5034d8691531d4db7c357feefbf0a1
-
Filesize
2.3MB
MD564f4e045e3d82bf27eb9a38fba2425e6
SHA1c3a8f3c2725509752d5c9c64ab7e6072c25d3802
SHA25666485826b251863e06e5409225f935dd7416baef765f0b57baedb919e474d886
SHA5126899f4e27eef1df5635d231be4bcd4e3d6538590b6e79f92a353173c088a11cbf2527909da5e3c80e61d060722e061f4af18fdde684cd92d54573881fd2176c7
-
Filesize
1.8MB
MD57ee03d405aca43ba9f24b03f3108bc86
SHA1b9f464590e8092fb33c48b04b2b9b1830486d287
SHA25624304f4b289b5a0141b07aaf2e586f8a291cb140872e44dd9c4ac4f91b0e98f6
SHA512fb0a7e97e44581faddd112b1a8055ff4024ce3886d78b0fc431c94dcd9044892aa278e86a304a29399946430a6efc5bc48fb702a2d05c7286bd757412d1fc366