Analysis
-
max time kernel
60s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
RFQ Engine Rodamientos.msg
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RFQ Engine Rodamientos.msg
Resource
win10v2004-20240802-en
General
-
Target
RFQ Engine Rodamientos.msg
-
Size
137KB
-
MD5
c9eb91ce5b5847179b15894ce22c6aad
-
SHA1
2c6a110b37bb26f70d4f3258ef715d1955625803
-
SHA256
fa4957f51d8e92fab7035eb135e74e17450c2fd4c86bd4c428151fb2ffdea167
-
SHA512
b40efc8925581956ac7e066ce117aa263da74ecb063d0e65609013fd95d1db47e24029a93d79c41b1dd969e6bd08e3a0f2b06c8f61736c650be920166e36b02a
-
SSDEEP
3072:28KB18jXhoIwD9+u2EjUiA+Yi0Wwc23dNY7jhYPF96:28KB18buIwD8uDjUt+YBra7jhSF9
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C88C0D21-767A-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2884 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2884 OUTLOOK.EXE 2500 iexplore.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2884 OUTLOOK.EXE 2500 iexplore.exe 2500 iexplore.exe 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 2884 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2500 2884 OUTLOOK.EXE 32 PID 2884 wrote to memory of 2500 2884 OUTLOOK.EXE 32 PID 2884 wrote to memory of 2500 2884 OUTLOOK.EXE 32 PID 2884 wrote to memory of 2500 2884 OUTLOOK.EXE 32 PID 2500 wrote to memory of 1580 2500 iexplore.exe 33 PID 2500 wrote to memory of 1580 2500 iexplore.exe 33 PID 2500 wrote to memory of 1580 2500 iexplore.exe 33 PID 2500 wrote to memory of 1580 2500 iexplore.exe 33 PID 2564 wrote to memory of 992 2564 chrome.exe 36 PID 2564 wrote to memory of 992 2564 chrome.exe 36 PID 2564 wrote to memory of 992 2564 chrome.exe 36 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2608 2564 chrome.exe 38 PID 2564 wrote to memory of 2888 2564 chrome.exe 39 PID 2564 wrote to memory of 2888 2564 chrome.exe 39 PID 2564 wrote to memory of 2888 2564 chrome.exe 39 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40 PID 2564 wrote to memory of 2636 2564 chrome.exe 40
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\RFQ Engine Rodamientos.msg"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://login.oceanburials.us/mDsIEdaX2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:537621 /prefetch:23⤵PID:1248
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c79758,0x7fef6c79768,0x7fef6c797782⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:22⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2212 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2220 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1356 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:22⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1352 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3424 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2176 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2544 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1168 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2644 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:82⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3660 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3488 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2396 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1160 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1740 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3548 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 --field-trial-handle=1232,i,16449617845116169575,8250881794122650235,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51cd4415fc8703988486c07f8c1e266d4
SHA1943aa1bd8532a85fd161ec44471bd5a6454c2faf
SHA2564f4eac16ca1ea47cf75f54e85c920153b3c188c61b9c1669814fb087392bbda7
SHA5124bcdac1b5dc44499e74982eede8966a4e9469488ca9e9aecbc4d09ec2be3c64469e8f02f4068de4f6bbcf212d90043c63695e45a8b01b675d27d40d331081f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5590b4a7f014a52377dfa96d56d817376
SHA19148297d95fbb74ccb09f523bddf1f111539a715
SHA2567c2e7a0a2d1b1bb100e8f3b5c3ebdcb475d8f1e61952325c21e4f2a451748e61
SHA51246165035708a6157bc6b666491d14d3f7f561546f6f7f9015ba3d690fc329ccbb6c05e5960a59053a374d37167f4e67e2e5c24106c41d42e8914b5f2b6f1ee7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3c9ef64409e36e3019d70679df2056
SHA18fb3c8efb5374b81360414517eafb1dd5aa4746c
SHA2563f4e5b7cfaced64e67a5c6d773ae5968bcdff7b029a3279f6cdbdf63e3ccd197
SHA51209ee91ee7de7e167f77e65710e20026296adb2cd87dedc3d69baddfed24d085ec36bac7a1dd9f1f7e979ff1af02b44bff91b9a47b1c308bfb1facbad1751ac8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ffc7257ccf542378975588df114285
SHA1ec8e99ca065ce4ee82d52dd44f29fe7eb5ffe165
SHA2561656e7f4d86c52b587d8f9233a75f9e4fedd799dbd64a92e21f576bf7be53e27
SHA51255e2b9257d5906e29a74de924fa6d55a3198e4d709ee6a7c05d27d321ad5ee89463626c7a49d3dd2f6cf8fbad84f7841f3c69dd4b3f9665da6f203570ba5cca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6b56837fd7418fbff47a994430ecbe
SHA1ee39053ab25c8feb1587582d4399f6c6e7176efd
SHA256bd9b9a5e5ead601c23bff738d91d655619c37603f74e20e3e08ea594962e62cf
SHA512827ba754ba47e7f24937489c5a80373e260283b5fa3aa3248ce17a15ff0cef9d62b7e206ac180e04d584bd3b2f0aa02a10eb257fa9de9e536a17dd9c63ceb8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858c70d714c80d891f709a561cb46ab9
SHA110608be05815b62a3fd05df1831727d3736858e4
SHA256a28951da14dd861fb13ee843c0e7775db5900b5ba14656c460f6a62a762b32d6
SHA512faae94722c25cdb28a13e834ea8c2ff4b868b7a001b6d902b6643208692be339ab908117975d8ce033d22540e103ee5e5ece10cce877ed9c7246eeb648ea9152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7443b82f105ac49c0cc0a7bd78e57ca
SHA10242a173b62ab8872073a8637dc808187d5d1121
SHA25628841e40bf6cea0b5701031c625874bbbd4849efa6adb1533478cdb6755598ff
SHA5125f7642c25214321832fa4f875fd246e3dfeb1c30ec5c6d12ce8fecffee0f44b738f3ad198ad4f8f7dc5754dd0caad0e9e9ee21c9569b99b529be3058a96048bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6b0dace561e37a40a993eadbc2f2e3
SHA1e62ee85dfb779f54a8e98d0d51cee907c6db2ea5
SHA256aae60645b94e6b14381ea47b1e8f51ded90bb5efe85857febf61388f51af16ec
SHA512a3ca1fd82b9224c42bc204c4d4a95fd2a1c54253888488e7b41958b963824e016aab371eb0826ac3692b81f981e8aefefdec68185fa77fd64be07a5a1c0e89db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5184a33f47957d86271277c3c10b6670a
SHA1f93a49faef3b95af5eeba98059715e7f040feeb4
SHA256d9abec2ce60ac873f319067b1bc0e94d30430c48ba0b2f9c306a93e27d3df4d9
SHA51280ed190d3d2ac50427dfe9d8f852921981ae8ed432770d9ea2b12fb09e59fee51614b4507abf6d2143b1ca0a6bd27aa8b6c0d28af6af7ebcf24af7eaf49c695a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d2954b7bd94fb421291a642bc2038ea8
SHA178d7bef2dc7ec738598416c3a37f297d3690d07f
SHA25626e56c5490a734edad30ef6bd45450e1121335e19326eb6628980b0c04ffcf3d
SHA512680d96e51d5a2dcc1bec673031d0eecaafeb7632e340013bc0f9d9b70119f660f1aa630528ba0fd3a5118c18bf0b7ecdef19e9b6307d5fdddba80edfdb2bc7d6
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
527B
MD5d0e3a345237c64fe668416b9a5998999
SHA1e2c3985deaecf69436ccd1c482f35ce9e5f20b0f
SHA2565b711b24a96713316327b4b482f848961ee3209a81c5e61d20085c067e40a395
SHA512da4e590777a2481944d018a7766fd86fb45f6e1ee842a9ad9fffc9db4882dac9c71ed805d6ee7070a2c57232a10d3c02d3d7a6e0f9075861027433714aa4a5c2
-
Filesize
363B
MD5f6babfb5cf792cb80a7fbc8e74391c6c
SHA11a5c291f82334482d65cc21ca2724ed41b0a6f66
SHA2563b6e856f328a596b1d1c68460a8573dbd22bfe0cbe0d22eefd5684940ff30ff9
SHA512a466b0b70bb140492724965ce6ecdb62dbe2a5038d0dd98efb76f27f8341980f310b61bcdee189a61e34aa5adace87bb7fab9f5f0c74bd4eb372f58acd8c7031
-
Filesize
6KB
MD5c690abf3876001b7fc33214cd48e36c7
SHA1a9dd20bd503ec2b611cff70922f357a9b646d5d3
SHA2564fdeee1ab20a30d659ef2450a0ebc2c64a425bf3d15c8afb135b5a66e6edf9a4
SHA51211a1acbf33584b6eb9b0e5f4aa3b0f46128a606c73b0c71790a1a244e4b958ed6489ee38c62cdfc9cb878fd52e2e5684e844d51fd5206de8fd3586f9c1ba4f69
-
Filesize
5KB
MD5f346eb9d5019e81646821461d6fa06f9
SHA1f8e14baa61d4573433dc075d9e65cdfd0b86ba89
SHA256a6d771da7f0ca30f66c79905ce46c46f66053ed08bda8b334f6e2b8737319b86
SHA512ab77d5484bb1feea1312176a12b681a09283f81f8f36fac257fe92aaf1593dee0df3bc95483b9fa0b62ad3b9cc08d6c3cd83d11cb0487ab999abff669f31e26d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
324KB
MD57a69a4014239aae8ad8028f11a8ed686
SHA18a524ce255611e7a0929931519c270c5a0da1ede
SHA2560e6920dec0b780030d6ac5395f686d64dbfd169770687f3508b77cef4f75b4d2
SHA51272bbcaf742aed510417962a02d45d67b738bc0fc9466c44afea7d9e04697b8ba4d0b5fa0bb9abd59cda01ef3899ef191c94670c68e24c19b20dd912bbf0625c7
-
Filesize
185B
MD5ed53c5aa88f85ca0c26d251967a71f78
SHA1c04d9d1b08071519dd802d0ac50f557c652d5a6e
SHA2568a3ba7808e3c8d669d26b4fd138f722fc09792ebf70570756d7639306a64fec6
SHA512a0d741953981f03054987235da1c327cc77145491c8c745525766a235d378ff69ad0b30c712b917f485cb9d2dbfaca5e2f15ace495026a08217e24288fa030b0
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6KB
MD5adf3db405fe75820ba7ddc92dc3c54fb
SHA1af664360e136fd5af829fd7f297eb493a2928d60
SHA2564c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476
SHA51269de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72
-
Filesize
16KB
MD5a4f3eef6700416a86092357fd153d677
SHA1bd3d3098e1f70de4b256c55408a69e6a35a7087b
SHA256d2db81b028e72c732b3d4512be96d8442f199959bee8b9ed0a14e19d3e9e2cc6
SHA512494363d1829e76b63f4c9d3c9ec40431e0d1ccef53d5a90cc20caab7313c1a2ac273964012fa352bcd85adaaa1cd06a0487aadcd1641079ea087b48b153c6497