Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
468s -
max time network
838s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 16:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://oculusus.com
Resource
win7-20240704-en
General
-
Target
http://oculusus.com
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d9033735b98e533c3bc3e97d7c0caf5c25bcc0fcd1694f3365bf9840609e3c48000000000e800000000200002000000064b58e14cd4ae5262191e506340ee40517db4e6be45846496bfc4de9f651d848900000009fa1eca7aee4320c9ef384f50f1ecd351713701bb84014c093a6fda680564aaaa9867b0202d9e3bba4366969f7a8ef2b687c41fedeaac0281f55b21ff93452fd70b9a404ddb27df981ca9c2a3aff588a716ff4c6bcedb6f50c7f79d9668eb3c40db472296d2bce21ee08caf2b5810947da0b6d09d5ec532277c8d055338b8fd0987108bb358d7fa29ec71dee1bae15a34000000018f3dde0f3e6e85ae63f29aeb0b94ee4f48dd9af083ff15cc084432eb70a8e0a225c9702eb24f33e9959490e486d8625a07dfcd0ee7ccf42b84fe584280e21d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a07fbc1addda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ecdc7a576b6e45f5cce357f48ddf34c82037c232ec8a271a052af45ec9214518000000000e800000000200002000000002cb7a400c3421e9890aed404bad5005183067861ca293e70b3ea4aef912bb6d20000000e210728d3a0ad53418e29cb420f4ba933c3317e7749b3b0857bd9bde2ee26afc40000000510878ad7bc800295d2bd74abc523d11fc93b33d8b5b3f3d3e1fd059b203c375d1a8ec300fbfe0e9e1fdcde3bd1b0710d0c0b5dfa51932586ff030442a31db2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4CC2FA1-490D-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2708 iexplore.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2424 2708 iexplore.exe 30 PID 2708 wrote to memory of 2424 2708 iexplore.exe 30 PID 2708 wrote to memory of 2424 2708 iexplore.exe 30 PID 2708 wrote to memory of 2424 2708 iexplore.exe 30 PID 320 wrote to memory of 2804 320 chrome.exe 34 PID 320 wrote to memory of 2804 320 chrome.exe 34 PID 320 wrote to memory of 2804 320 chrome.exe 34 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2168 320 chrome.exe 36 PID 320 wrote to memory of 2356 320 chrome.exe 37 PID 320 wrote to memory of 2356 320 chrome.exe 37 PID 320 wrote to memory of 2356 320 chrome.exe 37 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38 PID 320 wrote to memory of 2480 320 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://oculusus.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:930834 /prefetch:22⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef62b9758,0x7fef62b9768,0x7fef62b97782⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:22⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3196 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:22⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2236 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 --field-trial-handle=1204,i,15946709021399151605,6394763563284257992,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168385f462431b95d0343b107e2a7133
SHA12275f5ecd85d6f9112815b217087474bbd08fff7
SHA2561a22ff6175f384e596e18e1feec3f91f2f382e6201516d4902935db9fe966170
SHA512ee1b882b16e829056fee1bb3c3d775e1cbedd63474ef77593fd06fae704a321323af66c808b40ce2d4b1943fed122417994db25934529293b2030ed5bf1b132a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512331b40e36f6992a5c17c922d63556e
SHA116673f160123f6b13336af6a95bf06d0d71c89c3
SHA256c6442b393bd45bcd54e1d6fc751ab9278b071d2857f16a18eff03fd33ef3a6f3
SHA512b5cff0a93e8694b122cf30c2bf2d709deeded2a4e20da84dff473cad037e51c8bb76f34d6b3378f792dbdb91391676f3842c800d6e5d172b0dac10c571e13f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c48cb0731cd1757bf1e4504386be72ef
SHA134bd86bc0a28b18b1fbc97b780be7fcb3227c8b4
SHA256e17a74fd8819298096947ae8183770f0ebe15378625c5194a187ba632525f907
SHA512f8411012a61b48574ab9152520b7d6fcd6e318951966a1d83453d82d422ec0093f2cbbe9298e776b2c3c08b13069b9956e4cd9721bd2ea76198d35bb13b260c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f740b68309790befd67196ef8f973e0
SHA1cbe807e834949667fe84e70c2eebbe4e9fb04a66
SHA2561fbe103fe3096070d25fe02ea767422ac1baaab06841db9ba26d010cbb78db78
SHA51255ee8fd2e1f5b98ff791b75a475e3e48b2aee5eef69ffe6be95301673dc7598f6026437dedc13de5c5cf64beb8d66ee2463bbe7be873ceeeb51d0505d5987af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f30517de9f3c5958990fd5460b9fef
SHA19d2e5253f1cc73d76c34d68d2d431d000b6fedfc
SHA256e3075827da1b325504ce732b2f7ec9d61f7214155f3d2562252bb7bd4255f996
SHA51221299ca2936db2b51d8f4bd99d0626e9445eaefb42aa3cb4f8fe40cc4478cafc820ed617e8a4f875222adcc1c627e5efd27c84b2928478b8c1f63aef1bb0e2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55771a3c7b2f99ac067275a386e7eef26
SHA15f9622497249814add5eb202896789d990deb991
SHA256de8bc960ec420443919c95341e0dc4c6fe40fd7b48120a97812c807424ec711f
SHA512ac047e8f6d7f3e1df48160abd6f44674756b3c027d749cfc0d27286b0959f0d40ebdc5880b42f6ceee97de0b18330759fb4c7b47f31ea44079eb380093776cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a211813d747a3e735ca52b85e49a0e3
SHA10da321574f980c9f570e5f1f40852f68b2d33cc9
SHA2566cea51da1090ec491ee2870536bce447608f6a67f0535306e2f9aa3bc0ec7fd2
SHA512b369e9bea25071ac4edda0fd509037db1f305aea38e139ae306847f2ffb1431d59387c27b034fff3cae9d1404bdd5920234a28497e15defcba622f07060e3a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823b0ee22c06da0f7954be0bbcf30bcc
SHA12898937e1dd664a4b12dd91938212917eef53c8e
SHA25693b8440777c9e9cc5f546a8085111075e0e402a1643a2b108a722c5d7e2668fd
SHA512631ae8281ca7ca39c76801752ae372608009d7fa1f7bb45b4f0f64f5507da598a5d4facac988bc31db14351453fd9d8c3ec6717bd4a04998275fdcaac6244ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16ae2a1a35e009c1cff423a74f5a623
SHA1a80d0d31ce0837054fed3f238409d079140faf67
SHA25625dbe4d48df95f0024f7f48fb4c921c71ef445783539171fcfe972b44fac6202
SHA512d3ebc22c2666e6892ed30f19274cabf8a18c730c03974759d2de655f5d31f26c97aa920d7bd5c492530d98d534e9a8444c2af770d5bfdf825d809075249a6299
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD5746a075f1af9b76a4b68405ef00e1dc9
SHA1a89ef25701b21c1fcb119437751011f4e553260a
SHA25631a58fb9995fadcd030068cb62dce7d5b9d3c58756a20cffadcbe40c106a95bd
SHA512f81b2698e6924b2295ecab6c3d11ae7810f8e62be60e116a59d8d42a2f8a4170e46589d7758f4bb31cc2209aa37e702d8b210424764fb1888357ed72760de4f6
-
Filesize
1KB
MD5f1f8aed6dbbab524f1d39e20b4f96fc3
SHA1787a76d7c50d02d4b99cb99cf02988926e3305a9
SHA256f32402198241d59336adee72c0840223a054db094aab66fb90e3496950fa6474
SHA512428ac42ef9db97e092a867b9c63f5a2ddb3d2039c673baed9ac97796f57043307b2c4ba9645ecf01564dcabf796b52d4a36d8c80d72d4b09641f9c06272f016f
-
Filesize
5KB
MD5821abdd9de154b3dfc869fb07045a841
SHA1e32c8f372453366195de72c662e0d97b46150c1d
SHA2569ef92261aef1ac5063ad684d9e7c6c8a890f04b85e97ffb93703af80681056bb
SHA51220e9e1ca29a118d5327ac0286ee391ec2800bf0abb9305ea8e3df2755072180ea9f1cfe96364783f90af630f54da4760c5488b6f9ba3b0cea929cf96ba8d739e
-
Filesize
5KB
MD59c6a35ffb021792a27fae6e4aec8dcac
SHA1ac50c80289b37730b06932316f46ddb67150ddab
SHA2565315a8c6d3a5904299352b131ff9d10aeba65aa2730fd1cef92c6cce707c1da1
SHA51256a35951dc85dc094cca4e9ecbe0e5a721e9c0fdfeb1c70254bc8cea68241d67fa44ab2699bafc77724bb69e5e16efca45f4138ba40e63247721fc7807bbd174
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5e35d88654ab1ff08b2dd686fb47f6bca
SHA1f84c5e6c835d0b337ef260e154b616f049245af4
SHA25651bfc6d2c36e3dbe027ce70e2f0827f67e9f74e6985b604440065db6fd2ece02
SHA51224c4f7361c70e2edcd264075017d7b89906f1a37d1f676b7b27fd2d770f0d43e41d1b9c83b0b1fc7c56e4b8acdc6efd7d5c2c1ab27983c1ef0c1ef9c0b4d6c3f