Resubmissions
11/08/2024, 21:28
240811-1btcnaygrj 311/08/2024, 13:53
240811-q62x6swgla 311/08/2024, 13:52
240811-q6pmvawgkc 320/07/2024, 19:16
240720-xyvx8awcnb 120/07/2024, 19:14
240720-xx5q2awclf 120/07/2024, 19:11
240720-xwd7pawcjh 120/07/2024, 19:09
240720-xtxk9axern 120/07/2024, 19:08
240720-xtfmqsxeql 6Analysis
-
max time kernel
77s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
c12.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c12.html
Resource
win10v2004-20240709-en
General
-
Target
c12.html
-
Size
7KB
-
MD5
ed05d5b3d7de3d798bf68dfa44fa4aca
-
SHA1
8b93622287614b48dff54351aa6f956a6c670b73
-
SHA256
daae07490831bceddafde61b3a1829043648e5ca24778b4a69ffab9829fd97de
-
SHA512
d256bb6ac71c7d82f31c6d1e5c13536ec9c81ddb3c5060c017240be3ddf2a3f9a966924add381fcb2af26561dd04c7b593548b6fb271ad52c0c477a0086361d6
-
SSDEEP
192:xosfzn2lcWYAA6Si6SP6g+6k12045Tw8R2:xosfSlYY8b2k12j5Tw8R2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D3A20D1-46CC-11EF-9232-D6CBE06212A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000004bdb929159f622258b6f22b054d5c60e45ddc069b4affa7124d0a26d30a5f471000000000e8000000002000020000000c8f074f023467192cb885e9ed651e94e12a12f1814345097ed6334b2f6e3267820000000cfca24dd70eb7aaabb8a57c1add8a1b4bf8ac1f8c65e211b5ae38938a593428940000000e5db522c8fa4a67f9a73f7b09d9ea82e01c93c7a79e49ee65d602f71ea8709cf28f1d706860f832e819da50c296c9d9f84797530898447858a71b9d13b7fd108 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e4b831d9dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 844 chrome.exe 844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2128 iexplore.exe 1776 SndVol.exe 1776 SndVol.exe 2128 iexplore.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1776 SndVol.exe 1776 SndVol.exe 1776 SndVol.exe 1776 SndVol.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2400 2128 iexplore.exe 30 PID 2128 wrote to memory of 2400 2128 iexplore.exe 30 PID 2128 wrote to memory of 2400 2128 iexplore.exe 30 PID 2128 wrote to memory of 2400 2128 iexplore.exe 30 PID 844 wrote to memory of 592 844 chrome.exe 35 PID 844 wrote to memory of 592 844 chrome.exe 35 PID 844 wrote to memory of 592 844 chrome.exe 35 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 328 844 chrome.exe 37 PID 844 wrote to memory of 1800 844 chrome.exe 38 PID 844 wrote to memory of 1800 844 chrome.exe 38 PID 844 wrote to memory of 1800 844 chrome.exe 38 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39 PID 844 wrote to memory of 2304 844 chrome.exe 39
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c12.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 46007454 189801⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6269758,0x7fef6269768,0x7fef62697782⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:22⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:22⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3700 --field-trial-handle=1244,i,7475685618766995168,16460728129412524409,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:3060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6269758,0x7fef6269768,0x7fef62697782⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4877995420b6026c21b846f08bd5870
SHA16bc3e077c8ccb81f764700342899b3ba824cc013
SHA25688dff1e7c1bf61778da2816d9dc040204bdda7d6360b6b5150f7bc4cb3c9fc4d
SHA5121ca54b7c316dc9b0e44c2e427f295873814b94bf0f084f67d488ac4302d5d2850b03cc2401020bd228f066a075076faddab7b2cfe22ab3c3115a205247192e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36af4238358cb0f9b172728d70de2ee
SHA19dc3b94aa9bd0d4d6c8e0897203581aa7f43ee50
SHA256dc4228e7b91e9db9fe0f905cbf64e9ba4ca9e900fe6c6af2e6b6659e554088e6
SHA51267ba72245c2ebf9b2f6aebb89ea1240c619aadd10e52f414c5c5dc3b5cee99efe68109779545dbbde27aa60fe5312a0f5c9ecc8a680736f658ba643b0aedc683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757925f237cddefa8b0aa344df6a5152
SHA1f3679606a6ca52a88da8a0181a6a20b7399c2aff
SHA2562089ff5fadb4a64bba9149f5a3b50f63d0552d8dc96d56c3a189fd1a1661d19f
SHA512f759be6c8c48839299fb7e062bdd035005fbca2529cbf4e79f5dc5bf3f5459ce832c1afb80f538da47351ce92357e8b2d7ecb79dc106cd4cc8966fa1583db5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b684659159a4cb281348e9fde6f08b3e
SHA17bc7cca20df2755e79f1e305c89217407429e22f
SHA256877389dcf9aa557436a24c4d5b132c9252f272002827a9a991358f08b213dc67
SHA512d25d893813572a3ac07add7c6ff7f0e400a412a496c8980aa001962d33d5664d22faf3621e5c6ea3c5d851b3644a306ceb8a7eadbdc5bc1eef40eb5def863912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52865ca5923d5fde4ae471e6c9e6cb7ea
SHA16f2ce9199b2deacb2da8a899b8cec3189c17a8fe
SHA256718a4f8f34cf255d345e1eb7cf68ebe01f499e0f011c0007c8578a1fbea5a10b
SHA5127c53e0cbe2f5a754282cdf447db5a09f18c229fe87b852293d9bb26d4d0dfcd70e74a17bc8dda9c36aa4c0fbf384abb81dd0e22e157ebd1b1283facb0205afd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa529fb23d1ca12129d4698fddae6973
SHA1aec52d104a37645f606e511cb617a50b712e8c61
SHA25629d9e3588fa57f449c96bf0f2b3ebfa5a85acaf6c075b0adb14470e430b3e0e0
SHA512fb3d7bb595e8b06e22af8e40dde0f967497d33211a76b46194b64f79ba507f146f92215b50b17ed9d0b6308cfe9d4ec093d2148987be7c4e9c24a5c3be9b273c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83873263208d813d2247b27066c26ba
SHA1abd701c704f9d5f96be6bd7e3c4e5e927c86bf7d
SHA25691e31e4400e42ef79f2bc6d4b04c247c3b67ce2b099afc96a4986404df514fd5
SHA5125f0e764a4485cddab973837b9fc3d65e2a9edf4309bdf305c92f151844d470493a3cb7bcf9b6ba901f5beffc07456beee2b8d6e54ead96865da5b8ac92d24787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb295cea6033cda9516b430e271834e
SHA1c6e5f37e5269983139c85c48288757d4cf9cccd7
SHA2565eae4d2353df4f54ec8424e70b68dd82c94dce6a0325f8212e4f1ac83558545a
SHA5129f2378907c84640b7e30228761d4a5db02ab97d0a282efe982d4911b26d93a67942d898b7ca395fc1975565ce52711483c13e6ab7a7d9d420bbffac9607760b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43ec052db2c42c2558caade3c034b7e
SHA1e9427bcb2cc66b40036b6c5479a347d832b0f087
SHA256239b45e07cfaf5a748c3675f5f4ec1b5135a64b524bb3e66f0f26f8762be77cf
SHA512ae738ca29ef794cc14ba3e4f3657b8bf99e1f9dc7806e56c2258c4dbc8e5636231f006e9e37dad6bab56650b8e17680ad3c6c4f1c11bb71896543c8c25e3d355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0fae2a5785353d786a143c8cb1a742
SHA12a24560d3b82fa4d90e6431ec302521a1b052fbf
SHA256957033f8d21e9f946910635b980d4822e305f5490808db131b8ff9fee3b61914
SHA512223d40c05956258815652958ad580543c28185157d49f62f8b01ec763967ee67adffe2938f10b25241ae6cd716bc7315ba6ce17702a3f96ab4d01abf210fc005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb5c825ebcac221bbb885026603c582
SHA1287f1bdec0c3ba327996c11d51efdf85d570b134
SHA256e0dd8fac50859f67ce33b90da32f896d16b6797669ccdf87045293a240c8b9d1
SHA5127d8b6128f9a6a01e7f95e9eea81e59db438ff744fb12d37f91ca06bbe9fcc90b90ad3546714129d4604e776eeb3fb952fca1a9614f83cb5a96375a356745b4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff8f8a3d7e354514ff07c00050ed112
SHA1182cf37ffdac184208d71182bad0fa0a18f6939f
SHA25672111dde899fb91e6e4e6129eed99038dddb9905105f2b00eba5b818b38c8165
SHA512d7cd6d58bbbb563b81026fe8702389cfd71a5441d49c5349ba3d5c30e49fdd8af6767a99fe86e155f0990e419b41fced41d73a958a3e8bd56a0e0306a203b137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897d108b62e93da014bf01b66d888e49
SHA16ddfce51003367bb8260a0ffb0dcad8d3be1948f
SHA256e61c995f1f0008989489fda50bfc3fb25a48075aa35001383ac4295a6f27d327
SHA512edae3d8e4a32ce7103cc87b8c98a1644e6e43839c81b0cdfd0262f327091680c044d48553eb923aba6d1e90ec82874c989ccbd46345acc5034a641119cd4a955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb5fea05aa740c5fb9b953bb22c1fca
SHA1a8af70acc2503595552805059cce0945d1d839f1
SHA2564d2163a0035ae5e3ff29a60033729cc91070ddbbe97489b606ace8cfecc2ac87
SHA5121e661bdca90fb0c74922466ea776e2bb1e36cbc9a4ac7c4cde4899efe143dd33e56e118e84ca1d91a47b2b026e2f010a693a302ab7a58a01d7c86fb190693a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ce1b69db2c1c51dc9c57b56a33e7dc
SHA115568e05aaaa7d01780dd8f9f890347bb4b6b504
SHA256c92b39db541b6e38096b8fdb363caedd89e0f4554154df087704c355f2aa9657
SHA512acf0c2eb0baa44a3a9e6e419e8c69bdc02d76f10cce3b3ee4e5dc123d68aed575e2f863e72103e87ad04ee9445e6fcd48cb0658c5d69bcdb4258fb501d62eac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fc26121c3892579992767d0c61aeb3
SHA1e07b27222b1c42762031677f2703701ee7b5a8b5
SHA256ebceeb6b2199d5a6a56847a693135dae8fab2f20a81174d68caee054425e8d66
SHA512c155f3d67eac20a8a615cf8a0e05a8214411c64da4bf84bdd38589442bde8a7e56b06b732453ef5bfde47417b1d1d8d088aedc96cd2bd0bde2906ab762f3b15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52929eccdd0901ba90f4bad54135e95a1
SHA16867383bf4a8ca52c99fc1b0eaebf7297c19f7a7
SHA2566cfd8099c2b283daf431b6b2ee1c37abb34cdfd3a4144a158554ad63b1ac71ad
SHA512fdd436adb2dbaec19b83fe45531627d9b36b8e45ee375919ebcb4c5120905b858aaa244805e7304f7937ce867116f11917d0d91c5d8b446daf080c34285b5e0c
-
Filesize
40B
MD5afb41067687ecea644b43e2cc260fb66
SHA127e6a6607b864a0e0d91023dfbd58a811be6642f
SHA256b2ddecb055ae02e1b4e3732a92153d3f6ad7965ee69ab9e3d71557aac026844d
SHA512648ce3fcb7b07e030e507d962e823ca68b999a5aa972724441c00d410598fd61790037f1943a3f0f642fa01b6e8f37218d01d023a7b1a7e274a5c533bc1fee86
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5d2fde0c4747b82c33356ba45ebeb8eab
SHA1b0fb4e96efc783ae9e6918c9fbf8384618895c3e
SHA25645a3d27047e7e77c9569769ecb1262cbef213c12708988578335a03e4f36a7ed
SHA5124d43672fce805063cc06c99099d774ab1b119b775ad3427cf3fec331b037b4e257d482ed6718bde8788714534bc2293b0ec2ca32fc133c467f4c7829fa58405f
-
Filesize
5KB
MD5876991b7a9be890d8e6490a21bf49617
SHA1f99acd3268bb97f7b265123fa623fbd0d83cef3d
SHA256af46309f146df2edf63105500b3ba881c6f3a1e52f817228c1a033e2f6c2dc6d
SHA5126b973aa67deb40249da95d0fc619b951719b5a91c8e68f4e886772af2c02d9cfe6824b985d08d4bf8450b15ac818a4fff07f4195d9876b080edd74f1b57f786c
-
Filesize
5KB
MD5bbccae5d70c8f28d89ddb59812914c1e
SHA1dc4c2f9fc54fc4759b7f3168a7a7dfaecdcd214f
SHA256d6131b5efba02a2d8b0c269d718e5480f8651db38d362debbf9c56a107d0ed62
SHA51204fbc7ffd865aa14655b25df8f5ac5d83bd8c2a1d71d8f4a42ec2e792ee7ff8630f5dc0f1befd6e354e579990fa0fb1ff686fefbd6ff0906685a69c9db794078
-
Filesize
5KB
MD55d4a8fb66741d7b269b6e13b7f654b0c
SHA15417123a5c7b401be1f917c08035cce6180069f3
SHA256b7f141f4ae0f3e04c751785648cc82fe718df4c5589aa26a491c7b94165c33bc
SHA5123cac31a8d79b63035ef17ee06f8b0d73dd60ac1c6ea9d7d1d55b2381f1397377ebf07d0039800fff27322628846888a7c6577224e0df2316db41f413c733ab68
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b