Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
65s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
Bark-1.5.1.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Bark-1.5.1.dll
Resource
win10v2004-20240802-en
General
-
Target
Bark-1.5.1.dll
-
Size
6.5MB
-
MD5
c5afebc4d9076df032ea86b096e25b41
-
SHA1
fb724dfbdaff027b9c9d1ebbbba18377fd47df07
-
SHA256
1c664b4e8c029d4bf45836f4636445177cc020c03d5fbbb2a35b27a2f5c860bb
-
SHA512
0a1a9459ad2594024c294937499fc99d6930e5bc757a39874fcc484ef50086467dae698e0b9b67aaacbe091195dc7ad174dea5d6af9f13c82e29af0c167d54b3
-
SSDEEP
196608:jDFT/qGdWDufv6GDSUpJedVJ6uiIMRy3DGb06Pe9:jZTRdiXGD9pvujMR6DU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A3AD811-5728-11EF-B231-72E661693B4A} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 284 chrome.exe 284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe Token: SeShutdownPrivilege 284 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2044 iexplore.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe 284 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1028 2044 iexplore.exe 30 PID 2044 wrote to memory of 1028 2044 iexplore.exe 30 PID 2044 wrote to memory of 1028 2044 iexplore.exe 30 PID 2044 wrote to memory of 1028 2044 iexplore.exe 30 PID 284 wrote to memory of 2752 284 chrome.exe 32 PID 284 wrote to memory of 2752 284 chrome.exe 32 PID 284 wrote to memory of 2752 284 chrome.exe 32 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2612 284 chrome.exe 34 PID 284 wrote to memory of 2624 284 chrome.exe 35 PID 284 wrote to memory of 2624 284 chrome.exe 35 PID 284 wrote to memory of 2624 284 chrome.exe 35 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36 PID 284 wrote to memory of 1276 284 chrome.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Bark-1.5.1.dll,#11⤵PID:2928
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7cc9758,0x7fef7cc9768,0x7fef7cc97782⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:22⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2328 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1600 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:22⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3316 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3600 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2088 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1076 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2420 --field-trial-handle=1476,i,15356399381113970785,8909272396950443792,131072 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68107994b610ae5dfc4dc85f592154e
SHA105e4a9c82413115387f47e3b0fbfdeb99bb199ce
SHA25654aa24202592f87d5cec642b3b6144c37c237037b3bd3052185f6aa665a5b61c
SHA512d862fbac3b21d7c6d93d5cc81f7ecca138a040bc07882fe15b6acdb6d77cc6ce34ba90dcbef1954a844cfc216127a2bb11e3ad9dad76913df38f469978ce4275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c17762ce8797273b7eec315cf1b5a9
SHA1e4f672ed9cd6cc49ba90a2f657db2c560a93720d
SHA2562c042223a79535ac74139ffaecca6cc4ec08096393c39d0ec86790e7f69bbcc0
SHA512de5f35d4d16d19b6863801e0df55bc3bb971d4568f74d8bf38e2cb9cd303835d319bde5428ed092691bfd03c3891835222cfe9026e1ff2b994b9110980d4cc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206894a9f8fa674cec095a00ab32df6a
SHA111a117871be7079f924360b6b4d1eb85e77f1447
SHA256756544669ddd34813dee1ab44184c4736a2da1678f82c69c4b79f4f6676d79e7
SHA5120804ed2c16cb88595ab7d1036c6b87f45ce88dd5780623564b01933c471a38e550a264651b134c384ac256f3cc35f480aca99cdc633e598668c3ee01e8464ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070d89844a00ef2b1b844ec121aa6a46
SHA11450a4d7a86107b04abea158d55067afcd36b22d
SHA2566a3ecf9cb3e76328de32155292d7f25650b8bfdc77e99723bc7a38ad9be6c5cc
SHA5121405bb44ef0973cddae955bb1d9a3adaf5ce57c250afd2a9bf8c99934e1ca47f6454c99d6830f026cd6ab005b7bc399c050213457e2e9a08e702fca41602696c
-
Filesize
319KB
MD519b250c925cdc7511854cd3420cd5229
SHA10fe6d878c6e13a9916fbe68495d11d7c3b0f3e87
SHA2567ab5d481c7c2a645bcc289427af0c57f891e49072436f7c50b9a2c5f2f806f0a
SHA51226557f8b23b8f6e9974d47b36907d68d996533a735993f3e35528d583cdce739bf6a0dc8cd0c2c00e7ea099b87eb573eba9f79ad4b794dbb80035c72b3cd23d1
-
Filesize
1KB
MD5db259d0ff3314eff79ac0c848c926872
SHA14ff450e53b80806e1454e87774d883a9332eb12e
SHA256fa3350d69270551fc60fcdcdb8018fb5abbc4048edc5b574a240b34621ed815b
SHA51298e2e27a2a517af21bccea53c8823fdbca646da116a56686e21ae78497d13e169ba8dbb5c17a17662b9ad0e94ff72e3b0321d5d0c72ee39b376eef5c1bcda946
-
Filesize
363B
MD53d4feee5359ab553c30ccf561cef09bc
SHA1269574caee1f5a74b729cf20d06730ebfb6ea0ce
SHA2566ee4d1057fb29bb8893545c5d1178450bc9628b5425b7c098fd7807de7e710e7
SHA51241f02d6a10bb3d55dd083adc7f620451afc734ab10d328eef9d2d543fbaf564aaed0aa92ae5e4fe891e81ce716d67594b581a8aec5eb71e9f50880a785ad37ea
-
Filesize
5KB
MD5049853109bd51eb78cffe660cc550d6e
SHA18ae12222edf91ebb7fa5c6bbadc4e76f0e752394
SHA256db4f6912a6c6b4871ddd27987e31f884cb8fb9ded72b692080d05dcada38e6d3
SHA512c117ffe882b67db81de673036eaa6b612e610698d86a8763c2771a0fb46d556b9d083b6b87d64a60bdf678a98438fd2b7476fecceaf72838c126da27ef8a72eb
-
Filesize
5KB
MD52f184da2c42710424122c2f1b630c560
SHA1c1cade52e203d92cb31aaf6b01317621ac5f9f7a
SHA256795957a776b326114c79b29257efefc069fe7e935e893baf93b07ca048a6c7bd
SHA512ebe9b31a62ba9818a64b837eccaa314473c61c27ee6ad051f03fda31fc62d1aa8d9b3890c2cd587b22be6621ba8216433884c9251c9253c62770bcba3ca068ee
-
Filesize
5KB
MD529082e10282495ebaa664e0280aa9459
SHA13b753bddcedc4a2a4ef5f39721d9603f69fa80f6
SHA2569ab548ce9834b46c299955351b315613b875aada57c5f6a8e22275cab573310d
SHA5124753e3fcd21f14200aa80640d64f0f413e8c527d9e3f484cc5c67fe0584241be1a307c21830a27286897f9a9897549d56302712a675b9e13967d988bacee403a
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
319KB
MD5f5e05b6dbc019d7283019c3b30920044
SHA1ee58e8c826d6fe1a43595f08770ce9c1de28ff4b
SHA256ce2d8ff6420038d855e325cfee2e7f75e10a3b627bfec54452ead8bb57222da6
SHA512b59e1c7151c2f1049f2e73a7f27464d251c5e96b5b030a60778ebd9b103756beae8954d7edee90860917ddb9d5131f2b282d46a19f8f9e4b9afab7910f36792e
-
Filesize
358KB
MD5c6bf24bad1dc0e5ab800b18a9d30f5ed
SHA159a969ce4ac079a33d7a5e82e806953724a25edb
SHA256972365cd8bedd6969c737710c75a3ff958871539d4e8e6f29a57127b7eca164d
SHA512829a72574023956297c0be63b72b07fbac13226a2cb51fee7243d6394306443d0e6392951b983d1e290a44be5349f8af744629173b7b7e9a55eaa0f5d4cd4d9f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b