Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/07/2024, 08:49
240703-kq3a4svfqh 10Analysis
-
max time kernel
75s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
fud.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fud.exe
Resource
win10v2004-20240508-en
General
-
Target
fud.exe
-
Size
61.7MB
-
MD5
5b4e7d4ddd69c309731e35c33e4722a0
-
SHA1
38a49dd6d0f4cb1b49c20b7f018b6cb05bfae486
-
SHA256
030b0b50bac29a67a26420b3af6a0cad9819867ba4d660676da3004663868efe
-
SHA512
0aa980843875fa35852e5ecadee45429653b6a729724b34d1424a622e910b8368b22f5e4a783ba0abb3f48f5069882ded00e0f70d3a3675ec3f3fe1049dd9768
-
SSDEEP
393216:d76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfYnVQx4urYsANulL7Ng:d0LoCOn+2Ys4urYDNulLBiu8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
description pid Process Token: SeDebugPrivilege 2640 taskmgr.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2960 2764 chrome.exe 34 PID 2764 wrote to memory of 2960 2764 chrome.exe 34 PID 2764 wrote to memory of 2960 2764 chrome.exe 34 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 2356 2764 chrome.exe 36 PID 2764 wrote to memory of 1892 2764 chrome.exe 37 PID 2764 wrote to memory of 1892 2764 chrome.exe 37 PID 2764 wrote to memory of 1892 2764 chrome.exe 37 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38 PID 2764 wrote to memory of 948 2764 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fud.exe"C:\Users\Admin\AppData\Local\Temp\fud.exe"1⤵PID:1044
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4919758,0x7fef4919768,0x7fef49197782⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:22⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1532 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1132 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:22⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1392 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3604 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3712 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1824 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3016 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3580 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3684 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3884 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3016 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3976 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1900 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2816 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4044 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4192 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4496 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4520 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=4368 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:12⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1304,i,4139705291973613271,15924043000726553896,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:488
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:1468
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1468 CREDAT:275457 /prefetch:22⤵PID:1668
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55903f9af92a885a6b706530a817ae1e9
SHA13b965757881fa1a2e51ef50049dbf48f50100eab
SHA25613a6e3c698d86832fde22956e4cae8f047edcaedf93138496ebdf3c659c2818d
SHA512ebbecdc03ef496ef7faf92c3d5e9b5580b53b05b815cbde8aa52a9f5bd951a299f078a453f9650951f41b7974fb02d7bbc9061de0b340204e6036f7dc5fc6464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f708d0390143eef1c8b0a8b75aa5fe96
SHA1f1914b5224196d598c2278c91dc434292aaceb28
SHA2561b5ac720dbd8e350add1711c359401f355c06ab3f341b685526e22364b57a6e9
SHA512b7382b85fabeba520720e274a64bed5b19814a578c0d7fb2262a3a9558ea004785d7302e4972e538a5748c36909d214fb2379220657b48b841840458a82faa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c22f29ebbf43d48c4b11b69ecad643
SHA185fc87726624decf04eb0896bf2377db1f71a8b9
SHA256b4ecc3000cee83d705e68973ca87a0beff0f774b337a15db51d117121a295ac0
SHA512f9df7c587b61703cdce991229a02456a808547f9cce7e915de6190e258bf0c86b667c524d871d6e3cc59171bd76af1aa5703e6fc0b4bebe906a10434b0992690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f8da9c574f03237127769fe486bb3a
SHA1b618127424f52b944f13006407efa901ffb68ab8
SHA256b1cba10af87eb87be80b8060c6a9a3b821ed8488517dec5cf47bc7e0a9087e0f
SHA5126afcb7216cb2d4ee948a5eeba27e686a048ae133760cd392f12c6a3ca3f7156cfd084e50263214942a794285498ad75e42ef2019772f9fc0c9f3f9e2a694ba5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52078a8ec9dceb21dbbeeb1e5462ef1bf
SHA1e0effd0c17c280ac66f96343723273198716537d
SHA256bd6c3b61e364e448645b9baf6009a98bbd07496881efccf94747ceba1ee8f874
SHA512a255ef11a2a290a237f5162b84d8e0ceb784b76b49b450aa6790bac6f6334f0321effd5b61a35538b372f01139702f0abd13ee4f66521ee1e0697b50bc089c12
-
Filesize
690KB
MD5a9de09929b10829f8a98cb75dc1634d6
SHA1deac3e6c0ec728c5fd8e4653b17356c19e09422e
SHA256827709abe3ef941b25619cff3f56d66827315c4d3c7e70b38f13e46cf50b88e2
SHA5129011170a439a61c58bc5539b49867f487add04769ab909cddb677c179fd66440501dd78f6fedfaf0ff0b94856d66487b08d3651268851695eb74379564233235
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
690B
MD52ebd29110bc048979f4041ecda8a8b47
SHA1368918ec9eb5901162e6c783de9ba8fc1538feb6
SHA2560ad93ac041be292f2592c9fd5ceb41eb22f38bf10fdb32f0fbc5d1f48590e34b
SHA51271a8034f7f664362ba56e974af5ce55a0c8b552a7a8aef32667dfb0b644092a3acecf5f3b0e4c5629e403c816dcfb156e3493c834f90354ef834e4ad47645ae3
-
Filesize
5KB
MD597eae1926d9921ac0bfc99b99341b83a
SHA17e3563e2f8811dc7964b2651776fab095603c0ac
SHA25645c2d348fd4df0d028694d408437dea938e211ce4a581581da4197ee2a0a8fb3
SHA512e34af4f46e4854bb5a359c9c42816001acabaa364db59562a23c48dde098d8c9292a5a48548bb2d874dcfba4a131853d4750e96bdf941cbc13a49d2b3057e985
-
Filesize
5KB
MD5ea10282c7630623e7af113e9c51e9dbf
SHA1a62ca2fd7851396c611000d52e96163e9da802e9
SHA256e5db3e73ab4321a34bb8c77ceac348b646d3f954aed5d999c261fbd383951c25
SHA512d1bf029015b5a722af550572f94171a87270210c015d8ca19cd883c410d44cf701d2a001bc22d11bd09b796e08bbda432692d1812134a17d5361c0f0ae7c2657
-
Filesize
5KB
MD5f87e0eb77708d54b3f927520f7c7c7d0
SHA191ace3cb07062e41de6545c97a1656d2d46a5a28
SHA2561ff1112b127f54e2f349ced6d9fcc744811991c693b9db3e1ef3c863b0d49dc0
SHA51249239bb1e4289304962c13c0cb6b70c082265a483fce2dba9be24e8830835b4911deed38fd75c43e6118fad4eda81bf2bc73ea638632f1adf27540ad7a6d4a32
-
Filesize
6KB
MD559a9ac910dfa0a33417b0d352e95e1a3
SHA16dd66c912af231a737954053edc0b2797628f316
SHA256567eaa3594c9d16bf55890011f085067bdf8728d7488edf6474c5dc77d91720c
SHA512044f2f88e28b195ee40ae1d9b6f2348f9736af849c6f8bfaf14a33a7f62f91651cf364227057266c5c38f7545c591f0bb1af00766abb1759ad191d09c8b42374
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
154KB
MD5f84d6ee23c0ff0eb51a1b72f4d6a1817
SHA1cecc559a9144e7224f03a05d8b21c2396a45ea3d
SHA25699f4546fb223d36a6f7e12fe76320234e12c0410af5571902a97d9f493eb6011
SHA512a1fcea939b5591a40561e54f9eb892aa50ee0209fd24630c35ddc5a8b80d142dbe6fae0c2171685e22e3860586753d6cd5821807999ab9869ee20b340f8a085f
-
Filesize
76KB
MD59f6fbe440e3543f79099be3ca23ecc28
SHA1b668dabfec4f280f462fbf859ba25721d805e51e
SHA2561d116a6dce04e11cf9f4aa9ed6d0f61eff1f53997ae9aa8e81dbc50e145d5e7b
SHA51275d9a9e3ab08f6d38afb17a02009a367998931783ff7b51f1cfd47bb4f0a77daa6396ca0d0230c831e72a9390187cc1690c46c7637a8b578842bfdd627f7000a
-
Filesize
78KB
MD5c09b3959db4d2e97c144597d825baad0
SHA1b331970111f17c877e2b369a338f0b6991d4f2d4
SHA2568f2be9e4900e9ee0ea55b7436d734fc607b13beccd5546d6a8166866e7febc53
SHA512f84d828f89c7635dfd1317f929294d53ce2d04a45f131a965a952285b8ba27e19fbad4b5b6cec193e50941a1b1efe558c1d9fde3c8ee3f581b92d9de7c369cc0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b