Analysis
-
max time kernel
77s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
download.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
download.html
Resource
win10v2004-20240802-en
General
-
Target
download.html
-
Size
10KB
-
MD5
cb08660747e3bfb38f6de8492385ed1c
-
SHA1
25205ec0c5e05a7358ae2e08921c53bcd8b5a191
-
SHA256
cf69e6fcb6b15f8521ce78479503da6f1aca7c1d4e8bb4270a043098a66998f2
-
SHA512
be01179210813eb1b40a3bcfa5bb211914f9c4027c6f41e3ae11d8d6f79f803fd1d5480820533a693533c3e48af248bcba134546b93c6c613e966679f4018d84
-
SSDEEP
192:D7eKv5ia5iOVVVQsjiqTHwtH8AHgPwtHSYwtHdwtHoquXOuluquJEuccuDD2+nnu:D7XRVVdjnHwtH8AHUwtHHwtHdwtHjuXG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429809790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01b47755beeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000008d1b2f197d1d92dea80aac8001919f802ed3d397ae6ea637f636e6b7b4480fbf000000000e8000000002000020000000869c0cbd835a0e83ebc9a314e870d81acf012453343adb859b21497d452161e590000000a86c85658515cfc51967e80f33fcce79a19aa8ea5dc3c71c3c8f68174e62f78a9d456f34700cb4045b9954492797e43cafd2aefb23dc54b77dc44d40b93bfb59fd1f5ac3a323962251e255cc92519207a931eb43a8be22639f1866566c2ba40e9609d0746a388c28f6633455252bff110c2cc9d273aece3c2602b826c4b5b9e9e4ee179c876128fab99004ac35de75f640000000965cee0427c0bc0d42cbd100c5d85286f53d6fafe3b81b5f670314d45cba0a586b48016aff775f5c74a7a0922c63e009606176c07a9b9095dcd90dac6c9443f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000cc4756a18f2dfa2661c7bb230c3bef616404e3a17bef06bd5ccf90b503f3624a000000000e8000000002000020000000205633973c2651eefeadc5cf815d0b97a2f23670ed85334f575bd5e4a3909f0e20000000f4f90f53ba71b9b65c45429cf7545866f81ec322fc4c3abf518e5d70012ae61640000000f335362f0548b85240de166589640c12e1e0d22e16022a9493bec0e58a8726556b68f9a24409ceaeb4e92a7dec7dfbe7bdd541f4d75cc8e4932c48e561a2cd5a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0CE4BB1-5A4E-11EF-884B-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 668 iexplore.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 668 iexplore.exe 668 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 668 wrote to memory of 2780 668 iexplore.exe 30 PID 668 wrote to memory of 2780 668 iexplore.exe 30 PID 668 wrote to memory of 2780 668 iexplore.exe 30 PID 668 wrote to memory of 2780 668 iexplore.exe 30 PID 2252 wrote to memory of 2948 2252 chrome.exe 36 PID 2252 wrote to memory of 2948 2252 chrome.exe 36 PID 2252 wrote to memory of 2948 2252 chrome.exe 36 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2980 2252 chrome.exe 38 PID 2252 wrote to memory of 2472 2252 chrome.exe 39 PID 2252 wrote to memory of 2472 2252 chrome.exe 39 PID 2252 wrote to memory of 2472 2252 chrome.exe 39 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40 PID 2252 wrote to memory of 1128 2252 chrome.exe 40
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1672
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6189758,0x7fef6189768,0x7fef61897782⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1400 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:22⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3252 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:956
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fa47688,0x13fa47698,0x13fa476a83⤵PID:2284
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3816 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3684 --field-trial-handle=1280,i,6871139631120583618,6655533238764503020,131072 /prefetch:12⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52900ca0d7085ecc45243b36fdac6529b
SHA19d1955eddcbc835d2e29119711a19f4a3f0ac019
SHA25609edfd4ef2b1eb7c876d5ae72cd3c0fd7265d59191c3161049f360d40d118119
SHA5123aeb5dc2a5ae4a1385e7ccc309331854570037ab4390e2ebdb6cb8bd1c423a387b67b3c912f3f787bda48ad42795566e17124c8a8549f0f7daf64967bca67a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3a029ce9402f3dcd2c755f43b5bdb9
SHA12fff7c8d0fb007a66912a68b22826d7b43e10f98
SHA256c8aad44bd065af4f510f7f70c8d40864861f965c3921134e54c1d544bd3b68f5
SHA5122d44b22221422f4e4783f8b1598e63fa40150ad7ba566d03f6095fb558564ad48d492683105215a38d6aa0f6599929586409ec85b8d0d3f9c1c74cf4b5f7c172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7396cb1fa7a6bc848d81f9e7a3ce37
SHA1ea9e5c963475a17d02cc739dcb7396433a378f93
SHA256bab741fa6faef51ada32429bf414d952649d209b75a18e612f59aab9aa51f4f3
SHA512aa84075d83ad8759e6afbc90bc7ec2e8dc96b705c87d7cd6623539dc4e2359c503d168078367c583067cff66db55a98b4ee339ec58c22a887ba4ad9a2aa69c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a612be8f3956f0b51edc92a10d17158
SHA1d298b461ee8932ca2b2724c9e61f88cc1dbd7728
SHA256383d7b5d37a7acf3599bb046b17282358266edb8fbc7e8ca7892de51371ca6a4
SHA512c827ffd47912d3d9e96c9f8fff3c534e080da2607008690ef9494ca17bb932ee7304e8d6aee982ae0e8f8a8b9b1fc61ce0d1d70697f6765ff5c14b8dbf0ce916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d734e6af7828db7fa8197f10bf1b2747
SHA18a817ed9ef7f890d5440184f950df70066922ca9
SHA25614f34188a918c79ba41b846b09b0bdc72d14f2b6fb7caac4de598dd64ed46698
SHA512638c8b966e582e3efc454f27536000b2e852c1812f06d1027ca1d614483897bd48bc2e139dbcfd4634b3d00d888f491cca49e4de99c9566e09f2a099d6405860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f3b743de5402b2618cbd2c7e2aadd3
SHA1238c0888f93ff070f2a6b9a29d713b811857290e
SHA2565b109cc3b96548be5bede46add9b2bc4f4f14d3ca7dd428b84e67f5701b8458a
SHA512dc3693daf38bf66a6f5dc354117e700d76db8d08e0efc426232e718e24fae75dd23dd1035f37b9931c0b3a42a8595ef7c5d60a87f241f820cbcef42f004297df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20aa99f601155d08b0c30695e25dac9
SHA1c7fb2c3258f7a0fe6dc2a0efe97969f0c9b18925
SHA25628462d623de95e8f8f52b28c3d502a3418dae0c26301ec7377426c045ddf9ea9
SHA512603b3da1dd99099fa2b144bc141c5ab9c6c21cda33c4377f7636812f84e87661ec1719c00e60c0ba873b2854da08b3967b45e0fedf12fac23e191a29d82f096e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d7d2fa23a4376fdb5df5a67361a03b
SHA14dd373c7e36c4a513ab8af7a052598f38721e4f3
SHA25619626b0d9d357160b1f94548c14f98414efb15cb1af1a728475ff55a4dcf506b
SHA512dd022942ca448ef66f951dfa01a5f022e0684ea2bc420767b1db35c8896b2b7245210326f4a01dc6fab07e747ef92d62693965aa694481948a3e5f91eabe1095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad17e0a56af7c1bd52990cd836940892
SHA19f25d1b623d9cbf54df16c0b251b10cac4fbf586
SHA256d69b048849e80b53b489ba16dcb0250aac4eadf53992bf3177c5095ffc60d039
SHA5120a598d64c4d5893fb14219bab4b379cb8f35330de1a78913eb7a3ef88248a18f5835c74cb6e27d1e3add812ccc22e85c740e6aff13a9f146427fb3a8a75a7cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83983f64835fbea556a3ae8c4bb2570
SHA1e995c08b5c082ba1a561c2ce93cd1cd73a9f44da
SHA256beddb859f11ed3327206d35a509fac7a35150a5531b8a46d17e224d86cb26bb6
SHA512fb39415e2e573a541d8d9d2fc977d90307d82747c99ec4350e67627e82a9cfa10a932067b962c5857fb08c1437fafab1fe5b3132de39e29ae2bb8b6f773abd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58279617a877bc2a15ed8639d0cbf8298
SHA11db864b30b23c18dee73d82d8fac7aa2bcb6e33d
SHA2564cd4ec7281808268e9a0d0f01f9f0ac83bae6734135a411ed9322558dbcc6f9c
SHA512c2028750ec85cdcbb0ee6b11883d138f539d93bb01388c4f31ad2c41c7eefe7cf95e790786ec5a2bd190cbb1baf24f2af0d0b81e8d88844c8a7d84204b73b7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a749eff36d229aaa80fd82a6964f55
SHA1043e665a6fba646ae18761f82a155bcc90faf8e4
SHA2562d6ccb8c045ffc69d9cf6677690435e8fe75cc59a9eaebcd319eb170f73f6028
SHA512b6c7e69b4bab05350269bbbd6a484674fa7127bb122babcee2322ebaaa6b9339b7e0345a10dbfbab9bce7bd5f16aded8bbced5bd4472e932d086b44e5021e019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56126c8ab531c8e6b0ca3fa89e8f3c8d3
SHA1322a1b69cd6a9e7c33dd95354cedeefbf2b92a45
SHA25639404274789f6d5aaed16d5ab84f0fc2731aacd848d962188627a32052f3b4b1
SHA512fb54cad840c9115613fce130a065e138f13416dd08fecd564f867d9bd7a10c6f0a2686555547798e7024d7f993054f8f53bcb59917571b1dd107635d417ac9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ab71a74da19a4cfabf9f87c6b951e5
SHA1b6f40ef9732336bf8da20addd396821a832617d8
SHA256f272b8a536fa2f0c7c1f47cddb73484fc815d7a61691609d8644a8ff5cb670f6
SHA51227af316a62daf13e3e87968cdfdfa94fc8794e5d04a870f3af441360c01d517858b37301341d9c87ab2379350cde3bfc894e79a1f6e79ff6b15d95d0750753d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d193fb47a45f3a8b52e30446e13dd300
SHA1857b8084f4e21ec227012361df1f45cb5f06aa45
SHA2562e7aca69e7bd5ef877787b27675378bef1a3c35f1f9760c7567982fe1e9c4f80
SHA51205fc36e63532272c2c5450d960ecb8577cc3abab4212b9e708c80d6ec0a1bb77319727f13f0989fef9f97ca9dd574e57eeda76e1e4d094a60bb86960e758bc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49e404b44cea9637adcee090374bd24
SHA19384680ef4cd953fdbdb4e541108367bb9d20ea0
SHA25681e359724b6d27546c77e620b1f130159f55be6d022c1e3d2d8d65aad58a2e76
SHA512d26d51e5fad9bb1d28a54e4c28a5f6f0782d85ae53234286adb4853b90db6cdbe6fe9adcb1f807e80f1bc1564689e8d16f687d78a3c2315986a4576ef8c91e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a0de98557ddae6aad9a53d54bf6e09
SHA1fd2581202a6c08cf8acc741d7a54d78774a4ef4e
SHA2569b974b5a50831bd8c7d1b42f16cda087439af9e8647577a9f54c2be201f7a81e
SHA512c9d48179ed0358fae62a4136e1708e887152820352f12a98f8940222dbfc2aed053f88e9aa481db679565c73268cd23232a211ee00650544ade4092d21627660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57edcb5100b60443d2d83003a3da0e720
SHA1cb68c9853b0f496291fd2f688f41558ed1c41f8b
SHA256daedfdbeb9c91ec313a210535201b5464f6596c7ba3daaea8a8fb51b0b964153
SHA5127ab407d8aca253bcf3f508e943a1e723a801389c7ad7223c5408b50cef7026d553e6a94155bb35599a978fcf58ed9cc37a76002e95134a38d61c27925a7522e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD592a6c31a14a907f5e7fbb997a87bc753
SHA10d62429774d5a9d83ea74fbf0f88eb52fa24cb15
SHA2568e61ae02d8f3132c12f2bb86b36c59b049d1dfedf6555226fbb292bb9496fe44
SHA512429faf2f2e29fa0d8b2d101273732a9aac6355771bd7b5d656fa589972e8f43694485ec955590ce85d9cf2a4ab14b19328873a87247e6783ba422e277686ccda
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
168B
MD58b28f5c1d7ec550c6f8a235e6e3dd741
SHA17eaea6edcf3758925359bcf5ab9f3d8896fd6567
SHA2564adf2e180c1b43451ff7b7f344074fa423c2c88e619aff19cf4f115fdccb33b0
SHA512db071d7b327f1a61a7ceddba40bc4906584f29b69861467924b577f32cec3f516ddb84f153583c56f2babefd4697581787cb51fb3faac69f25d849ed51661906
-
Filesize
168B
MD58cd20effcd1c72307b3bb791c8fbb187
SHA11619eeb9b985d676e9b147db5d4ffd7654969251
SHA256a3338152946cbc4756b9b965fc0b71841a3c9e74c1f6a13530ae606dd35d7f84
SHA5121dc2d080c419510cf9abbde1d005575e530ef52aa631910e63af2005b11da715c028ccd89e723acc7446111754c4ed61b589db12452d51592eaf9e7281bd0565
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5c0274dd2c74305942b5051b08a1b402b
SHA11d69272b90541931a8396926eb20c26b5d5a18e0
SHA25626727bd6e44dad73ef298e53f2ef3feb1fd68003788076ff4182ca47449a248a
SHA512e1d94f41fcd32d40afa5c766053da32c249fa45126a86117e7c3267e48199713469d3ba5bb6db6667b23874c369295c1c1cc7c4fc8b45b44a3961783b2229727
-
Filesize
363B
MD55b4a867715fb93a955c82e20ca3cb3bf
SHA162ff2610024eefb48962fd4757d28cde675fb4f4
SHA2564c530e9ba2a06437ae5b592651dfc7a8665fac52e053bf22479f165726cf0b93
SHA51239538e54b24c66a14991a1bc8851216047a5b70e6fcac740be1eedbb2638f0832df635c4228e760bdcfe611a83dff7e09174f61b6cb26193d06e86258063ab3d
-
Filesize
6KB
MD5ccf6ddb0d7cac12a9977cbffcb5adc73
SHA15601238cdf1b04837234b84d439d354691b67b14
SHA25649b1ff55c7b6db6a7eb25448a12eb717b498b7e29c67098b08f607fc02fb6b87
SHA512508e882a4e7ee08a6779c6c8033da6da5df4d9d1148fe2c4c3e22d9b3f585e60fc9f82528f1bbabb118998e89b45b450b878d17f4ceb239683e54c31bafc9029
-
Filesize
6KB
MD50afb850f7d38165e04668cec84b1ee73
SHA13bcc5371a94c93f961f51778f9b7f4d9a0010831
SHA256e024923ccd0479a8346c36eef38c0b0f6465cc198a91678935c565d4550ee8be
SHA5126333e881c93f4aedf4bf78e1307a0e4a1104c735689bc9f67da934865a110c0ce465e73366acbab3d51f54507ec4a63437f4538d0aa26d18b6666034da20dc26
-
Filesize
5KB
MD585766ef963f5d263831c857d38e276d5
SHA11180f9d8ed92f76dc85c0a99fad50d4c0b32aef8
SHA25688493c95a5a946956ec6e3b34d801c35f1577cf0b01907db83954bef5b313a66
SHA512f89c7031497acd50de00b4d2455c142b1088bc42dfe31ed914ab336b81dd195ed05e0e3498af61c86c96c9d3878a5d54cf8ca72caa851a1a63beaf4729405917
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
311KB
MD5ab849b294539636d73bd4bdf69b2191e
SHA1585317a8893fa7da07f6f8f407ebc672127e3d93
SHA25607042dbee6f1ab77d4efc3876442a66e19b9ee255a0f3ec3fbd76e79da1f51a4
SHA5128b60877734e4f9f986c5564571c76f889e468ba4c2989c4bf56f449868975ac6f408c26ba5c97c8bedd05f88b3502beae81f7a23c6c0b197495ea1b52bb7bd81
-
Filesize
311KB
MD5a7c8f3cfc19669a2d2fd77c7f24f9105
SHA1b9966467c345b0124fc88e8a581c5e9890008c21
SHA256f9ea133405703b8f6f0ba6700c720a499b5599e66cccc91851e61bdafb6f3316
SHA512d8ecaf1c73f78139eb717298506714544df92437493406659879d4388b2be62962636399b4f93b0416d39fc3ec0eb228d32b3fbcc4942b90d810a2b0069a875a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b