Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
416s -
max time network
418s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/07/2024, 13:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mailstat.us/tr/t/wliccx4yzqe3yzqe/5/https://t.yesware.com/tt/5719580522305067c170858003585987c9818052/a02181100708409220243c809c050674/9092202f35e8180edb4504aa71958052/dds.educampeones.com/YW5naHlfbWVyYW5AY2xhcm8uY29tLmRvDQ==
Resource
win11-20240709-en
General
-
Target
https://mailstat.us/tr/t/wliccx4yzqe3yzqe/5/https://t.yesware.com/tt/5719580522305067c170858003585987c9818052/a02181100708409220243c809c050674/9092202f35e8180edb4504aa71958052/dds.educampeones.com/YW5naHlfbWVyYW5AY2xhcm8uY29tLmRvDQ==
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133664730789726260" chrome.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings control.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3940 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 3892 3824 chrome.exe 81 PID 3824 wrote to memory of 3892 3824 chrome.exe 81 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2856 3824 chrome.exe 83 PID 3824 wrote to memory of 2724 3824 chrome.exe 84 PID 3824 wrote to memory of 2724 3824 chrome.exe 84 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85 PID 3824 wrote to memory of 456 3824 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mailstat.us/tr/t/wliccx4yzqe3yzqe/5/https://t.yesware.com/tt/5719580522305067c170858003585987c9818052/a02181100708409220243c809c050674/9092202f35e8180edb4504aa71958052/dds.educampeones.com/YW5naHlfbWVyYW5AY2xhcm8uY29tLmRvDQ==1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff99f1ecc40,0x7ff99f1ecc4c,0x7ff99f1ecc582⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1784 /prefetch:22⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1836 /prefetch:32⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4360,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3260,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4480,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4368,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4972,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5080,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3732,i,10201513569066474404,5928107609945572015,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4540 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:828
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2896
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" SYSTEM1⤵
- Modifies registry class
PID:1940
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2824
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5297252f981985b96571349815bab7677
SHA1f37deafbbf8f644bc15dd69141f92a3718d31ae7
SHA25622d22cb156d6908a811d29fad65ae2acb86ca51cfcd727733db965c8fe4de598
SHA51285bcc53dbe8eb5016dc9c24aae15acd23def8c19f17c65e1b4278ef54e678787a769eaa251a3d119380a8d9dd64b78f17106867ca3569e4c9c00c00010754e6c
-
Filesize
240B
MD5e82d0c158f672409414bcade26993b7a
SHA16fb987a3734a59822378d8d0254bec380fc0f6be
SHA256883d9d4681d677c283a410e050d1bfa6013d9a3c1d6565aea2fb671bf4a79e89
SHA5128a4b0d62a581a540280a98791bf123b8faf7b81befda7eefe6724162c0dc2dc72051f44f5023b7c39175ef397f8172f9f0a54019727f8407a35bda8e853be147
-
Filesize
168B
MD51c7515ca9a5f7e7dc851c7362c4245cb
SHA1905fd566491027eaa8d67cb71bd93e2d9a93e104
SHA256eb340d2f136cbd817cc779b51323ca5c6de24d9903f4c68e769b2005034eba1a
SHA512ecb6dc502cf0a04a34e9dd61093c0caa02c841887ac5d718e96c4c180f1bbc2f55ca84131ad06f319df12e2b7c8ef32641bec622fb084641b562ae0ef9bc68a0
-
Filesize
216B
MD5aa4b5969acb91852eded40b67defc5b1
SHA14b24c2fd8abd849790914fdb114c159d40c2b0e8
SHA25638ff7f2ac8a5b521e19855b465b871c43afca3d0e39c45d22b2879fa96c858f9
SHA512c18241d7b5d288c9629589cecc67a8e1f2a4728310022aa4acf9652d32f7bd5c7e0eeeefe11b79c5c3386db4d32a0ac92e3cca63c5b4f06404b595e8e299219f
-
Filesize
192B
MD5b78c08c47ded1ee84209c3283e48f507
SHA12b24d2dec83b135aeb2db19af6cf73057c36963f
SHA2560c4b5a8ae5bc21ebab2bbba5547595fe59ddcad13289e5de71ec4d0494b99047
SHA5127bbd3153daf6a1bccf673c86ec8b07a33afd4378011091fb6a61e7f9764aec00bd309a752e384e12a9c37f5f3d96acc3429884e6fcb07a3ea1dd225573cb5c68
-
Filesize
2KB
MD59e1805c60469e8aa03d3b67a7abc42b2
SHA192c8714b8cac29e65e9c0a144d752a8d73082fd1
SHA2567c1d47e1a6bf1d768aed16d532c6bad3286b09c858550edd24227120a1be1354
SHA512af30b5ae49b699e7ec32206cb301b7bdff5950bbf037caa5e1cdfc18be5c1c254fdb7eb59bb498212e0564f28e61ccd6e38bc652b26b8d82de9be8e799516b26
-
Filesize
2KB
MD50a1fa141d660726871bae73621330060
SHA14e389426e91c75551a45f8e69cfbf905d19523bf
SHA2565130a0507d83fb9a111fff00f6eac74e1c286cc070a49702cf3a66f566e37678
SHA512db8ea6d8f04ef7cd7123b97c0a3d7b5541ebe6f6b4b0af0f00ccde972cc9d09a5f546102979b328e036062e83876bf43e5e9b620beb645fe72040064db04c9eb
-
Filesize
2KB
MD58aaa15adb2f25288424083f77a3b2c8d
SHA174fd08cea3eb2d40e542868e956c115ee6188250
SHA2569d941379149fb288c15b4b3f3062358f76a549c5f7314fe4019ee9bb56583ef6
SHA5129a76073962ff8d27382fa813719e1380c08798decfdf9841b817b9f978bf5388f20a1ad013a7afa57eaf36154d6cfb78a07ecb1025ceaf4562bad79be702d616
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD52b9fdb0b1272e97db4b0d12ebecddba5
SHA1ab0bd093f5407b1cb1ded71f2aecf658ccaa9905
SHA256ed7e83722a0f1fa39c0d7c1e29bddb47af0338c109b6d7078f5682d04ca9debf
SHA51240053bed5e8782aeb4a0c0fedd0cc9855682d9800bf51c3d6f358fc654675a3dbf3b37054b0c4a9678ac6af6760cecf3058c20ae6d1f3d51730aa1167cd859a6
-
Filesize
9KB
MD5ad4061e954d64b3b4ef7dbb944791f0e
SHA1ab9f476d857ea5b78f68fb4f6621d1a3c1ce7ecb
SHA2563b212fd963a93802a6245bc624b076b650d0bfd714fcdc85247defdcf11489f7
SHA5128aec959bbe8deb8e16638e850159b3e27b6920e144d3725a0d0d8b2270e53c06eed838ab481f2c214dd599b0cad1d58a3faf9a7bba9f04ee0e8f268d1ebfea40
-
Filesize
10KB
MD5e0f124a570a9f2b5abfbe208b0cf7bb9
SHA1038681c551ce69fd4fda7faf9656637b37184e4a
SHA256187d8c619c0c9c6b19a30d04fce6d6a1cce4c0e85315d10d01d3acdfac2a6873
SHA51209b72b149b186da6ae0d49e181c6ea3583dd3e02a98d8dd0d83ae0bb5f0f47d739b22cfec16746b671100cdbcf80f8bbb4a4c9b940c494cd6edb5904c6df8720
-
Filesize
10KB
MD59097bbaaececd9dbc2a5ee01123d3350
SHA1418fa9c83f1428ce497d8363a7db9d71ac93edd6
SHA256f93e13a9e242eeda8a323ad49594316183fdf0ba8c6e3ac4179e0c28f41c08a7
SHA5125947069e55b4f5d41786416f3566cf74e19318f999016e826c149fbf48a73ca01f4a2337440c5518de014196dd2bb565959a18a15db73806fce89a228d381dec
-
Filesize
9KB
MD523ad9a55b798a6f4dfd705aa40b26c5d
SHA14b5a01df8e7cff569f30b29a2e19f1e6ad338716
SHA256b1102962c2e8141a7593c5bb72285fe6896a3fe581600865097340adae47e214
SHA512b9bdcfdd6b559284d2a5dac005ae53a8bdc93234867f574963b01de3cbe01c3b3226b033a2178897a27a592e95ddbf1d8c740a710914e669793aa3d729fb5c3c
-
Filesize
9KB
MD5e39bd11526500184f0d66b75bc0e0c69
SHA1dad735ac110cc529adcec894a77d6048893d45b0
SHA25610d75e51f5ac82d2a2f4d65391ea018e7ede21236194b4b06d04ac9e8e922471
SHA512eb0c0afa7f94a4076d06b3599e9590bd978fa25e6ff890c611ac7cb8f7ca6abc385be9c5171a6720a0b58161bcfded5cd80b05801072464d0fc7586fb01497a0
-
Filesize
9KB
MD570efb3771616967183b7f9f16f39e35b
SHA16e2debc60c436965dfd334b650d5080e9b55e668
SHA256c53af73ff6f0be6504c0ade500f044adc657b7e66c7aecf4452a56a126671054
SHA512de0e7899fbac859453fc4af1fa6a1415f4e104c35af56644ab387445e05e3f52e7514cc88c43474765a66b3c87e625d7eea2aedaab64395ba4f4ff721e4150d0
-
Filesize
9KB
MD594c3f8e4d92fa858ea424083b36b4f99
SHA14a82091910cab622c6b8ac643b2faff79aa95768
SHA2569c8721a2fec3c8f89bd006755188a71f4478c8e06c049150c58d4131d3000db9
SHA5124de05ae4097a6e6a8f5f7f2c730d8940b24e72090765c5e500f56dbc4872ba4adf2bff077b5aeeb72433a1bfaa4057ea178eed8123b55c0feb5040413e85aece
-
Filesize
9KB
MD5bd5af58aa13b4f14d8af9fd799f37f40
SHA182d1ea32217ba46948df6fd68e33bd01614845d3
SHA256bfe834234c48b50643dbff7a0fb0170a6b1203d2ccafa0166e390c7909d58b48
SHA512b808cc1ca161b841addeb9fa948740b95d9697fab43bd1efd590d4b784d3023c5048ef4de9fc254e08d9dcd59a5492497210480991ef6f215c2398626670a809
-
Filesize
10KB
MD5d4fcee7b75485a71ba5af570ed6e76eb
SHA123ba379087573fdf10f144be7185267131d3d75b
SHA25642bf0022fac4b7521849dce09d4ae951be371da8e4748c37ea48a514c0f055f9
SHA512c43178b4b5f754aa9750288be68fcc8ce677f32da8b58d9ec937ea4a72b5e65365652bb4f8128bf8a5ae8e7557f2bb257ef40e0239b8b265abaaba97ad1fbe82
-
Filesize
10KB
MD57b1832c5c4192e7d80cb13c41f827847
SHA134713fea89e52afe596f0022bc2a425413a79c26
SHA256227d2fe8c8de4881634ba2bfd837705c0bc41bbc2538b38aa2d967684160b6e2
SHA5124c6b0ec3eaead97361848f44084196e1fd8e4b2e283baa5f508d9872c72ef58d5cc38db2e45211e6f86dae4b696e481d1ffb9a9efe46fbb5271a8f65ac2fa138
-
Filesize
9KB
MD543b8ac253bca82cd201e82600db2db31
SHA183917e088bcaa7b4f50f59f43577bc25b49c11dc
SHA2569bdca61356616e4ab71dbcba33cdf7ced32635f8cd611c5f9fce447158ebbd2f
SHA5120faeead585098926ad23e4ca42bd6cfef97758cb95e9a11dcd33ce92eb28cc0939b17df061509ad0317588c84ed8d9fc40bce543b8ba0ab69282fcc336dda76e
-
Filesize
9KB
MD5331e72fdeb371d427ba4cca437458705
SHA1c7b352bcedba630cef06785369f872a7d8571dee
SHA256d240838f9e2726dbb3151bfa588924e57b1e33fa23d140bea24362dfefd4c608
SHA5128b672d13327a5148d34e5add7b629cbd1a3b35b40412b7e2a4eeac5075d5eb32d8e110300ad7bdb71975c52e525b928b2cfb557425dd88f00cb5cf599d711f21
-
Filesize
9KB
MD54bdbf3e938bb0503fb2163a20bec7e52
SHA1c19de77a33d5ba739712364d7e8e17f31419612d
SHA256cc4854ddc96a5abfa5a61cbb2be52378822ea8a5ad3ad8e6e798fc18f0bc378b
SHA512fff3055d622803e9cdea6aacb2be6f55a149552669e046f5acd6a836b9fc32403d1d6494eab9141ec2f143c4c887bff34ca8341e1c1095d9894c9cce038da4b1
-
Filesize
9KB
MD5461852472ab26eb787b17f662b96fdb2
SHA146a48244021a89c9ab93d75bc83ddcb56e97e57c
SHA256e4e352de91e35312f129b0e215d9b27bd4085f73e676a4191bd9b76943e0a33c
SHA5125aa34e955ba383567f3b4a6e2cbac691bbfb875250f45d0a46393ce7edfa68d656626e73ae42f2e62c7c86d3dc0c076451a8b0bc11fa73dceb5bdf50b5540093
-
Filesize
9KB
MD5ba1dafdc472aecbc0364975aa5d8673c
SHA15de9784dad9690517bdff13208b49e97e237f401
SHA25658c4323f1e7aa5cdf647dc1aa0064ace5bb707f0fccc7f495fc8560d50e2fed0
SHA512f03c3f95454191c7ed7d820a5653a9d2317c37f7b5db83fd72c09828bb220a76b488523fa616e88dc25b5043f90e95e4372d1a3af7e73e5693b8c2b8e97ce6ed
-
Filesize
10KB
MD525a0e9b7daa2815fdfc88fe7d636a0c6
SHA162d63e9f42ac92c18c69304c849b4f4d6f088394
SHA256b123e011bfd4990a0b5a46f1040e7f20773d723ddbb965ea0250962c5ffd24c7
SHA512bae3d2189d730eb28fba2757b4799850cd6346d7b27333dcdf4185c012ddfe1dd863506413165eeb09759171e40dbdf5e9ee5130fa22694a39312b3f851d4b4d
-
Filesize
10KB
MD5901168e37c2a2dd644c58cbdd0df6e7a
SHA15069a0ec3bb5f0c21a0dc05e2942605509fe2510
SHA25693e82b11a3edc2aab058a6980d18a5e967b16e2c81f425f1602d96e0e892857a
SHA512124ec2979c19c65c056cf35207fd4666af6c12349403b1cdd9b765d5af1b3053d45e2b89a1371803f7c2a8e8f885d4224451ad28c78bf2b44c1d937eaabfc1fb
-
Filesize
10KB
MD5c8571250a07938258fd9ac54a4584bd3
SHA1dbfe8adbe18a37ef34efb2700005a6f056f05186
SHA256cda6a4d466f6e5dc3ed8e9f6905ec084f598e048f078bff7c624789c7ab4d581
SHA512044f0d93e67a52f9e4e7c7c7b6cf33ab844395bae15e79f1bef14c97de97a66962dae662137dcf7cd31923090317cf7b29576e2ff4b3ffee6d3a4b7a72bdf405
-
Filesize
10KB
MD519ad145dddae78974379fd2a92f3248c
SHA1c0537d1c0a1e81285174d0e9dfae022b4bc6feac
SHA25669f3d5cb04b1b6b1991003e5a1829773cd8eeee7c1a7edfee62af15cf0590139
SHA51228e7528eec1169df412191993cb6fd53cc3f470199bb0e5109d9c8b34c3c3005bbae4dd39e19a7fa4103b49d7ef50d244d647556b0f99979f08ff55cbea1b874
-
Filesize
10KB
MD5e603b31a72562a91e444ae4c9a2832bf
SHA1d417624446569bb81b1ca777e650acf55789d0fe
SHA256bf88609cea131965bf5b0f90337e5e297a6f754f815372da2db4b7655d7b63e5
SHA512c8860b5d153e4b48db1123c61ea2be4649220f4b893cb6e96c91958d96ae91cd188260879accba512add01cf8ebc89bd779f28a056a1a6399c713c8d93b118dd
-
Filesize
10KB
MD53850d76fb44b896c34e4e41b7497cfbb
SHA1faa6b8125fbe7f9b450d488a83f253e5e06bc40b
SHA25671c5f4f2e7743b70ffb6acd9e20fb22aeb1cd8ba587f0032ea36324ae58af994
SHA512cc9e25d1e772f866c5230a3ac420f129ccf26a3e0ad600d5df15f923d5c58005fbefac28dd37a5b2fd3f4c3767e3f6ecb47f1378852990d5e74ae7f9c2934fbe
-
Filesize
9KB
MD5fb30a7bf09595393a9e320d33062d7cf
SHA1ba748bf76fa5f5c649c46447bda2015620e9d947
SHA256cd638c2bc202c207731e53dccfd0788ccc55d95d886ee524209407fc8ee81f52
SHA51258214f167944b7a709966a3da70182cda8db69b7a90c2c9d561784dcfb16108ebbfedc233835cec3310cbe37c2fe1d6f15ebb960e0949d7fdd87356d1211300f
-
Filesize
10KB
MD5fa08cb394a8b7eb820036bd5339b1b3d
SHA18d0f15958a44defd9581f318c75838d9425b363a
SHA256b462f48bbb8183eac1cccc7ec79a6de2177789aa6b4d1468dafb11da9157555b
SHA512ce2913449bc48c32f7d9b964fe58c3e9d582b9ff02233e8c1b0079c79b037676df8b43d2207e7c58ed924fa8c6b1843003ad16a1817358ddceffbb6bb0b1b7c2
-
Filesize
10KB
MD5a4a4ef7f87c5c47f135a8e371bb6e6d5
SHA19028bbc10ddc8257df86c6e501281ae95877463b
SHA2568c120b9a2fa4c7c8a1161376b13011f4489568a72ef87cd4c2861e613dcc3071
SHA5127e7cd338ca03a30855176d4890a65108b083af0f0eb9a06b00808d3782542a8b62d8d7878bba4cf0f53555c2f19d2882a9477c49f1a7e9562e21562b745f6e3f
-
Filesize
10KB
MD598934668205e0417e53d59dee2b1abba
SHA1027a3793ee36ed5b5be0288b35db02bac09c5d46
SHA256d21e361e423062be89d44c9033a4df249c1255fde7bb2ff77cffa4e4f17f5d17
SHA512763daa334d0073e58637e9be22e0d33bcc24bfae70a42ab54ad0af8afff39a0d04bfd007e1df3902e305fe45de75b79fae595219573bc42e9760d75cf5bab2a8
-
Filesize
9KB
MD5a72b4bd9b2148a13aec2883ea373bf79
SHA1aed4dc8cbf22c2e1a4e85445403b3d9798616967
SHA256e2b84803f24efff0d2033a8a52354fc593b27f6df516171fb967eded0bcf319e
SHA51294ce9664a9351092acfdcad7acbaf3548d261cbfa9ba18e17520049d173f2b22d01f5b2332ee0943818bdca0bbc539d3ed8365bcfdfb56fae5fa8450e461d565
-
Filesize
10KB
MD5956e0f1adb5f58ef24143e2e7bcbfe44
SHA14a6fb5ae6f7b71d75e86ebcad9ac54cdd218fb7b
SHA256656e99e8dc7bb1570d64b4ec30cb863852ef9aab54ff1aab67b3467ed9f21074
SHA5128144e80e075da6c9c60d16a248a8114f34cd4c993cdd683823feda5061e0a85e0057a17d90b112357465396dc9946e77a3cbc6ce45f7e189827985ed6d24e96f
-
Filesize
92KB
MD5df50d990385cefa4321306ab2934e585
SHA19d3101af558cfcdccee3828f5fd2ef458d16ad7c
SHA256c5591fe6f81cf77805558438c8be0354587fcb03fc087c221481172e13787e0b
SHA5121d8fc69e75d025957cb4489977131a1eb39a7f1494356151352a9ff0c27c979133011b37936943c84a638cb0c1b8b61c40fdbe3bb7c7d462d5c202f8c1076492
-
Filesize
92KB
MD56f34abb47caf622609c7162c634541ee
SHA185d70408e35ca3f4c4b1bf51f258f1e8553853c7
SHA25646fe50bcbfd7094ab3d64ae6397bfdc02d1769acf8723b6964a0ec6cadb89a23
SHA5121c54f87fb782cd1158d3c68834b7d104629e99f53d0c06e31faf87839af821f93dd90384f15848ead8f13934c8b97fee97fc68b79502afcd04510007732714a3