Analysis
-
max time kernel
76s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
777B
-
MD5
42ffa11c72ffb49b3b172190abc1e22d
-
SHA1
e59b6dc3ea826627050473cbd051f52e5a140885
-
SHA256
9c0b557b90d288b2f729a682f173e9edf3a37dd1aa7f48be54e66d308efd765c
-
SHA512
912b0394741250f88f438fd516dd5a671cfe17aef68fd06dc661738cb21e52685018e62b1702f0eaba65563a82f72dce86088a20090639a195dc366ed6b456ad
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000acaf15ea55ea423c43f9abf2bd1644cbbb3a6fc56e2558d7b7fab19ab70655be000000000e80000000020000200000000ac613be8f693eb4c81b21190bf960a74f8c4bdc20d4a8f189f455046b6e990520000000749bed9bc3dbf2db006bfbfc4dbcedaf9f63975627fb452fb20afe594d08e7e8400000009907dca48c1d1e1846dcbb5102452dc5173121e61262f1b1c537b1e7eae33ada57c0efb91b0877032efcae5731050eac5eda676988b28256f8bd8df5720e69c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0453550a415db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434129175" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B7C4811-8197-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2024 iexplore.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2508 2024 iexplore.exe 31 PID 2024 wrote to memory of 2508 2024 iexplore.exe 31 PID 2024 wrote to memory of 2508 2024 iexplore.exe 31 PID 2024 wrote to memory of 2508 2024 iexplore.exe 31 PID 1160 wrote to memory of 2092 1160 chrome.exe 34 PID 1160 wrote to memory of 2092 1160 chrome.exe 34 PID 1160 wrote to memory of 2092 1160 chrome.exe 34 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 1060 1160 chrome.exe 36 PID 1160 wrote to memory of 316 1160 chrome.exe 37 PID 1160 wrote to memory of 316 1160 chrome.exe 37 PID 1160 wrote to memory of 316 1160 chrome.exe 37 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38 PID 1160 wrote to memory of 1860 1160 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66e9758,0x7fef66e9768,0x7fef66e97782⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:22⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1536 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1464 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:22⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2256 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3564 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3680 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3580 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 --field-trial-handle=1356,i,3236558957353533285,1096336115702079245,131072 /prefetch:82⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676f35163b165bf3b49601ebd262aaa6
SHA1f97b3920d8f02a8649bee951f8080fdee403d6e2
SHA256c3e0e748359fc5db15ad46338f45a58aac90c5007e3ac01bca92ceacde157571
SHA512dddaa211709bac63974fb38378a62f4225ecdd55b5de84edc103a20d3cbbf3f968a4d41af6d48de24f7811f85e3c76e96b643c756d3a4079a11e1387b1ec1ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e579de22ce2d189d119b665b0689ff5
SHA148c5412e25eea894c33de056289e3067ce7bb493
SHA2569475dee75b445bf14b6fb16edf9e65575e6210dfce010286ab0e219ea1007f8b
SHA512900f6a4d57a3a83e1ff41de48503038aa7433acbb84d31f5e2fcc3421cdeb5a875e4c9051afa37080dbc7895b0d6ef82ea2de3c6144e900348aab04d27b929db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c1ef94e08aba3c148ecb74f8c8141d
SHA18f3d1986cf11917b58c0e5e9e5a599358e5a1337
SHA2567ed9ec34c970961ed4c36948275bdd0143bc87d1a4ee26edc2d41717f30b26fa
SHA5124490575e6134a5509c1a9bf3839334e10dcf8665602b31f820c99839943173f3adc451cd26a83263cf5e63cc9e7e5adbaa175a2b68b44e3774c01ba6c56acdca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ddf67cb2c0df5ce5e839e15a26e975c
SHA189a3746613be31ab60636be9758b7d0bb988fcf5
SHA2563699f8138edefe8a2b20480eab2925c914d2ddf70d078b970180fae956fcfa4f
SHA51266e6812e488ede962281a45d1ba3d0b8d6ed035bcd28d2c9371ca8b59198d769a4c35103e12bc73c5274220c8c12720d9caad4473c730ff8efcee5d2fb8d389e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915fc1ac33eb9c5230afa6c6ac1c1909
SHA1bcd2c43725e3a830bf08bf325cd0fc5fb6b722e7
SHA2561ca20b30e1efc0d446cf8e3008fbc39d3a9164c59c82bd6a75c086fdc79eeb18
SHA5124ccae4cdc4738f152826999fd9dd0cece10c67436b1a56558234b0b42dc4b5e6b16b1c170bdc86eb9cda8165ec67d8972d6238cf10c603ce68d42f9c069fb899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67aff81d0824c491485289d125d0475
SHA1b207d35c9b8e643d5b620db5780825ca2fcafcbf
SHA25696eeaae2bd2b49819efa31afdceccbfc0c15ed197044f93bcb9f37be56c4b760
SHA5124311e1ef343eac99910e902e09fdea068ce47243d1cd86fc2069fcec3fda39949b40ff8bd8793f172840f0384a841ce0ad3a4f68ba9365407677938439fd9985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931efb8aaf24e2f65c73ca1515f57d66
SHA119ce5d1fddbb67d1735069bd85c85c0b4a105efd
SHA2566516c831660da60949831adcf899d48ba6c3dd3ba74c85c6fc46bc2ee777a3df
SHA512ee735314be7ba98a0206cb0373a3e75eb2e285b01d7683b41a95ca73d3b00f707c28418f6d0590b2ba866a71faef294f5e21768b46f9993678c5d5226ca2fe4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd09c4e8ed7436c70867de8304d0d64
SHA1c8328b58efc3fa90daec7d32fcd31939b0d30b35
SHA2568bdc1200fa0745fa07d68468ba82693d23453a91dfb851d169872a998204c4c6
SHA5121a1b40f645b6a1280d1bb6ac08f0e99830f5c6e0341de5a7e15a69c2ae7891af3775e2f910360f308387225fd58ba26f0410d3b28320b0412c389e3342d960f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678dd97639826cea0bd48b20dad2e2ee
SHA12950d36262cdf52af5f54e215ba1f2ea9336142a
SHA2565c976b9c8bac93088f629bece97fa2a88663eb3c8aced4a89b72f70e13df9364
SHA5121479c632cab1fac024f4b6ed0cd82be0c683a8d1de07d56ee7781215de94ebad7cc8b7d097fee7685656c4bd4036877a71e0231809f1c7d2a1b5afe92be806ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784a1ed1c4f316a3677744d13f5ea4b4
SHA1ff1c00f1985f921bbe1fff3f5214ac69a08be074
SHA2562f61a73f348430238023ad6bd21df340a9339678531d9969485b05b8de5386e4
SHA51211ce898c931e9e2da8cd30dca5e3108cd9665afa9efe5530ef1fc8123d1573518ded62bda2f84aab79c3fe078efde95ed8695b456859206e713c1ce9cab17160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aca801703ffbb39ce3baba5c223877d
SHA124eb0f611738d59c87247f71d4d79a6d82c968a9
SHA25692647ded1dd6a1c8f03162538a4585200f3e01fb3ca303c6433875fa32cf9500
SHA51296e6bada788fa1b0f8b56f1de56059550e9c402385db6a05eb3df7189e97432312d378943f8fb9435275cb74ac15eb2a90f81963906d97d0690eedc1b84a2c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22e3635debec642333020bac94bf345
SHA12285a869a399be9b74e9e790001c8a5c9b9d376a
SHA25636ce56fff3756f235151a5b0851c91631bec6207342637bd022725132d92c5a1
SHA5121ada359f51abf1c2ad1801590a8663cd68a58e050d3ec48c50075aa82a4127897e94fea6eab8fd5a4faa7ce351e677c2738ec23ca9571f059726126e7251e7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046afc512da3ac6cbe823a700ca05c26
SHA120e2c0b50566ad75e36f688234688b4f0e25d798
SHA25653e92b327fb248f56dff13b08a2b188eb649aa6640c9071518f43c108e1c9902
SHA51207b8308cf6ff9c384e1f33cc2469d355433e566f6e7f7daa5de6a9f191a64e80ac7c6e245b19213eab493c9fdee55c10f573a7db6d0443af2722738a745f0023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea2832bfbfa2eca47bab19b9416e455
SHA1229f696f40812205ffb659275de1fd6955abbb5b
SHA25651bfb2f2dc8a4cc44fdd1e6d2fd36e7ea0534fadf46d9851c76416ff7eebf729
SHA512928e36e5773d8cc09c90feb362c548be4789fbc618566fe8edc28aab6f96e8e4cd1fa9d422db5fadfad83a29f13ffe2add1610ec47086620485391e32cbec7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546defa9d0b54ef83da2070e5aa9958dd
SHA13a4225b78af98c9d07a57f4a63303d27aed97f3e
SHA256ca00e56cee9354550e04eab18180e9bdb069e324dcb664292a8374de8b2f7588
SHA5125501c1cbb5561715fd743bad08568aae48765a9d78bf3930d1140442afc4fc4ae50f8591bdfddc12914753ba43b201027c05b27f1344838fca006025402914ff
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5cd431586c5eed3f4853f5a220097975c
SHA1fd11fff6744a30b832ae4a1d744798fd10a86a72
SHA256eed3f5aa843c795224b64b7d5ce3cd2947261d13d0b5e24e9608315c241c68c3
SHA512d80cf03bc029cd8bd2a08370e92213d3d62d35889ad871493628d4dec46b783fca0ae2798201138b3d12f26260266c5bd3581c7c7944f656c4e661962d7191ec
-
Filesize
5KB
MD5a2fa6b8d0249f98e87169d28cfa83969
SHA156a8c28076b83370369c22749fd814dc21232b86
SHA2560373a05fccab54750f57cc0fa2a680e632afdd3d7c1a6f00693e89b833cc0c83
SHA5122abb65d56be0d0c553e8e0cccdca15284e7aae8aed7427dfa9a97891ae89945076a6a576a471804842a2086fe367904667a5091e78f82dfa80ea7c777ad58868
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b