Analysis
-
max time kernel
41s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 00:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/B2iUtm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/B2iUtm
Resource
win10v2004-20241007-en
General
-
Target
https://gofile.io/d/B2iUtm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a6982b4f2edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{531DDDC1-9A42-11EF-A1FD-CAD9DE6C860B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002018fa8f81d2da4c9868ea4b1575852500000000020000000000106600000001000020000000c867fde3636ddb1b7dd74c600b2434fb95daa696e3262ba7245b49501c1d896b000000000e8000000002000020000000498bb6438b45473890af2c5ebacc0ce24883122d5f93c507fb0ffd99fc8a653a2000000006d26db0200a1e672080a6d5dedd304149cab96cdec9e1ddaeaceb0d9a264097400000007dd4ea43af1b7048efb46e1a465a1c09c7425baff985f452aba90dd2592005fefbea4f270d5c6f3ac6a3dc92d6d820f7084bf6f7416089df945ee3ec05d41896 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002018fa8f81d2da4c9868ea4b157585250000000002000000000010660000000100002000000045a570006ad7cd71db7de13c3446b66ebceb0c195a1d93de192eea01c145973f000000000e8000000002000020000000ea2f1ecaf905fb09f8d0c89555409e215803649a2a2bbeec4a2a09351998fee6900000006cb69f659cbb14e169701624e2c20301a6dadbfbb7de119759ce6ff94ce21f8bc0b76cf04a3fea73d4d85985c16c334a424b9f20a226983f4d9979992f0594f0d1595149f1673557ffe472e07bf4c1d0eee4a8444704442147d143ad9d2defd17e0ba3074e39ec82c2dc024d4cdb14edebbaabc30c0e371edefb159ca8f05b5f3e2ec0ac0a3a843dd2758ab82348bfbe40000000295d4e55ecc8953017aba2676be03207166ce4a233687faa79b092ca991304eb84e2af2b724828a5d92a6522b8633ec72b91cec43c68371be858a972ecde8248 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 2656 chrome.exe 2656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
iexplore.exechrome.exepid Process 2500 iexplore.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2500 iexplore.exe 2500 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid Process procid_target PID 2500 wrote to memory of 2452 2500 iexplore.exe 31 PID 2500 wrote to memory of 2452 2500 iexplore.exe 31 PID 2500 wrote to memory of 2452 2500 iexplore.exe 31 PID 2500 wrote to memory of 2452 2500 iexplore.exe 31 PID 2656 wrote to memory of 2544 2656 chrome.exe 34 PID 2656 wrote to memory of 2544 2656 chrome.exe 34 PID 2656 wrote to memory of 2544 2656 chrome.exe 34 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 2996 2656 chrome.exe 36 PID 2656 wrote to memory of 1524 2656 chrome.exe 37 PID 2656 wrote to memory of 1524 2656 chrome.exe 37 PID 2656 wrote to memory of 1524 2656 chrome.exe 37 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38 PID 2656 wrote to memory of 2860 2656 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://gofile.io/d/B2iUtm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a29758,0x7fef6a29768,0x7fef6a297782⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:22⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1568 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1740 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:12⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1340 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:22⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1396 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:82⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3832 --field-trial-handle=1304,i,4782092924718511999,6961997630578872450,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD524cd8fe7fb0556283934462c813d9595
SHA136561fbe53d7d0a889ea1f55ff3cddd9ee14ad12
SHA2567895c1f9558617867eedc57dc780aebdc311f1e6c4fb1921b122b54f852be348
SHA5128b67da9272c5bf9b7ca45e9879094df8723ff219c92dfa675dcbecae6dd5e463c2a8073cbd4e9d88ffac68acb7826275bff28ccd9f5167cfe0680a27c6c52e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c772fcfa32c033b063a390798d8b556
SHA1dcc6b92dd9dd8c76a791fadd6fd6fd71b75cd49b
SHA2565f12d43d35996a8e12eafdf9788dce22b5ecff6045cb693ae554f0c620bb5d91
SHA512c20f1c226a3d65fe1ad6c4587c3c31622f689fd06624333986c78a7b66bff3e547d9abd5ce28f3b6203a23b38b98eed2c3c2302d058d8788ea5d5acaaf9d1e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561677098564914cca4dedcba2dc02d47
SHA1b607127d0e4c1fe881ebff780acb2bbae543b688
SHA25638b79275cec685c50cfb5a3bec7bf67f3aa309dd77bda257a0ebaa2286bb6c22
SHA5123287767f3a35df35a87ba8674445799ff0af5a9c751c844bcfab14a97ada6b6fdfa7a23f072588f72ed049c1bb5fdbc4894c938d36a9838c81210649379b040d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9644ac0d356f301e6ed506cc2732c0
SHA19e22ed431d556e0461cac3fe4a79f432b041e4c1
SHA256549d77968caf9b44f39447359f4dd6f5e963b60048e7b146d0f15990c974d6a1
SHA51242a2d7e42df6a945145bec1d45e675ab71730375cff3314706b7e34f77a6300613196fcfba831208a76ac57cf2bb80efe145cf61300de9643c95e81294ea47a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573148fa57149350212264ae53186f73c
SHA1d1f61e07ac608d97b76a23a7aff447925a80872b
SHA256693d15c9653ef0d5572c13551c30abe8d8c6f5ee03d04d0dbd3536f7e86c5074
SHA51238dd461b00b6a5c59dfff49808a6545bf6afb40f0dff98ff07b03a8c92ebc976e011d9ee0762fc5161cd759153345e81e7537c29ba5dba33d566673429f17288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a145e531f3969c9441e8817413fb5f
SHA126dbbaaba3de4e58195413a1fc92c08ae871ef4f
SHA256cc2bad0ca5f658123934f3b5185a1a8dcb47e736b860c90b4169d43e558f7d95
SHA51288d0240e50a6891a09e5cc7aa7a27eff0cd4c8b1aedf11231e82fa61aa1c24082f1c9b123dd17d23499c05deb24faed5888db43092eb064ef88e41f66a01ef63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506510c785c10fa11aeb15229e6cf9f2
SHA134c14db46225fbdafce54c80bf9b1784af4460ad
SHA2566de74a70b09f3896cb21166241c57b9605889f3749131e0b332d2763358ff22c
SHA51229a6b03b9e7bc7e274f1aa1715b032030784d39a13b687982e1b30456a7fffa17654652f1db444ee715e200f7c0a6ad5719c42dab2c901583b9a84d60ee0e20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25968f4556197bb621d239889775ce9
SHA13fb638351d6055336d218dad84dd596cd1150f2e
SHA256803004b31407005cdd5346e01a95263646cd8440d7f5bcb18836fd3bcf479cef
SHA5121293e5a06893d170168668d589bb40f48b8ec6fed8ba8ec7f27da66140e7a315cb448967c6b79855343a1ac179eb32490e155e15eb9b109124391c88f2ba57f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d706a254d0c82ee71a0aa445aff4488
SHA15c34efdad37d88553958cc71a002f0186fcf5e96
SHA256cc2cc3db7f3d26f18e3b72fdea19db8fd0fcc7955bf010c707d9a01cbd276f0c
SHA5124b345a424a6f0820e6cac4c7447a07d47e87e1bfad658beedc37604012bd5ad353e80c2dbbc2cd1729f1711bf34cdfa555e3a9b06681bb07048251587199847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55947f1d816dcad63b7dfde329d79fd20
SHA1df0665a8642273752a74a7b70f14ff95ffe021f0
SHA2560493ed7c9e4a2e7de4c367d30f865ea685b1a9afd609b1b876a63bdca8ee81b4
SHA512a646e06e5ada7e5eb54131e028f8cb1ebf40daf5e75f13a0fb2788d66db6beb143ff4062d8d47841b6076cc6d38ac7083c923166238291388cdeca9beaff53c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62f6236eb6647f1fa3682479dc16b0f
SHA1a77291f1e2db14e3e35395458d702aed5e0af2f5
SHA256562d889ef5d262c5e6105cd2a75d59c38f692e1d92113b79110c92ba237be1d8
SHA512777609ca426fa3d832866ebe9257001b52f8f6df3595d4a7480c4f3853027e52b788999c9fc628beb07bdc364622554fe7f65b6a864ae9161cd2fc500abc5f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4237a9a9cf878a9d1740d94f1ff1efd
SHA17127430b4033e810892c93e9d31c8a7c0b7e964f
SHA256a2e1ec0e6ba23bc47cdba2c5f09f9e35b1a369c5b40178f06063578b3b0cbbeb
SHA5127069c32bb33101892d848440cbaabdbbc22df3cf438e50f5d8f74367400680e98a1cc37225f24405bc1dc3271710673d7d31c95d55d8934a3600b0db98bf298e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59802726a00901a115d325204d544bfee
SHA139ee003f19088221373c7ba1f342bde32709b1db
SHA25611838dfb559455f4021513f371a5c94e6ae9d14693d4f64efc4240065079e333
SHA512b1ccd292062e0a4d92de68dc77e2b6e41a9e7c7e5a38212b423a3db504b4b19677fed737c2fdf077cee4f41e827416bdb1f265ed6f935de416f97acd46bc1846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556df5e48d2bbff256ee85606166667fc
SHA1c23adbf9ca4a93c940d4e8ba3e382591ae90184c
SHA256327b99ecc4c877e1d437c3bc77613da752ee1181dcc9f44e6eab0f74bb745864
SHA5120dbc0af8da7c457c393f4ae44d8b4895930006110ca15d8c1a52a2c24b8cb85993babaf7b371715cc15bd97589f09ea3c032cf7b76bce2db27d13a60c567687b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fdb55655560a10d509243ee81294fd
SHA1537f52105c639ec3d2b00c0979b626634e98e361
SHA256c28495ff1a828b4b428b33a088bac0ed76726e7015a242c32d8eea37956e0591
SHA5124ca3e7315e1bb2eebae5147d8b721a07f66038d9f940b60e5bc5356564d256ff8c13a258f2dbdd689accae0e50a3ecaeb4cdec5bfd9b00cbaa82b7a7eccbe52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4c13a910ca9c19cd4345ca5bcb145d
SHA1785edbe2c9d763926afe24279e1fca1bcc836ef4
SHA2564a5f1ff60ff67d02df41d878aab02b2f53b9adaf926cdcd30d2267aabd5189f9
SHA512e82d50c0cd1176816f1a235d975cf6d10153dc54642aa8250377055dd7fbfc150ed49781e6d4102221a11f52b4aefc7c1b1e28f2baec0239715c61ccd603e6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4f4011dbac9375f86d6f85f668aa68
SHA1df808161cd0d495354f64c89c41bb50803ebcef9
SHA25674f7ab61cb374be3126d768c732dac64c20fd2915e54f5c622a06c9ceb4e917e
SHA512ff69fb58b77ffd8153c51153e2e167645cc5bb8bd13dca21d9a31a0d087c87fa7bc82a4b16b1c29475c5f565b5b812b0ac0a2e43c59b807a097a435b013522ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa8a2e822f52443f294a85175753f3f
SHA143ae58f7b72a70e5a571692bacbf96f69d0f6ed5
SHA2562c129e5efa5d1457262cfc658bd6152192313e655b6587960d82a7a8bbb26319
SHA512ab69d0ecd371878b819a1a6630cabee35fe9a2e7ee77ad9972019aa9c4e2ce1577b78641c74313fb7302a2c4aaeb862ef395dc641f2773c9cbf8f7fa7b6ef933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD555c5d032c8fc5110200d286fe3b9f157
SHA15f61107b3daf0de4a7599c89e711cc6334ac4f3a
SHA2561fcbc89cc89b3ff3a9c77ea80fc865fd3113c47754c54af61c432b32489ed06b
SHA512d0e0381109d3a1070bd4a25b38367a4da8dce81f3efcee07838ec68f1822dc9cb17f89529cec8e0ab82b966fab93072d689261a111d37fab534513284d2f7a80
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD59bab49bcc597bc518ea6fd574ab11cd5
SHA1d6784b38daeb1f495ddaa158149d93f68469be4c
SHA256914fe48a89718c211a3a68d55bd9c5d20abe530b7957372d05d5f6bd35bbde48
SHA512e4d9221c51205c165d37234c8708d30f9425a9492c9f575c1dbbfbd19ab3d174254668237081bd303842c62ee9962c2a78ceca8b40d62a1abcdddf2131a3bcd9
-
Filesize
5KB
MD5f07b4bcebbf86f7ad9dd1a80a2183432
SHA1e2aa4733f4b78a53ed3980ddc9880c10b7e7de37
SHA2568a8159338ee763218b38d846bcb66614cd7bf3452e769d13bb804f6d9a7294eb
SHA5120df4df0aee9fa9c5efe98e1ad95abfb6ef8a04caa67ad6e5b50c6e95e2628f970731659a56be81e7e3ff8ec6bbabc94a17fa000e4a68d746a60d4c0d399349f6
-
Filesize
5KB
MD598c3926acd312e96c0b311666d81dae3
SHA118c1f278cbb9f850f5a55ae7c4b99fdea8cfa9cf
SHA256845dc74d751c3e841fd8eddfaabe929a1b98853532cfff12587488082d6c7413
SHA512eac2605dfa89d0e7292dc7dbafd9a93aa2843ce14647163d1db559de63cd533208029ec5101b2e016a081df6e720b4c3904278a37a92f1303b280e44d95e7eac
-
Filesize
5KB
MD54fe8949be6d067b72acf0fab47cda459
SHA10dfed6afa53f57fb1679f6001efb68fdc15c7eb8
SHA256046bf32edc67b8f8d36b999468b90df01fb044d01dc891384cf5ee2c9e75540c
SHA512d365e600efd475c20a3bb1df976137ad201a93aa559d3ba323d147a0eb1a82651e9c2f1f9cff19804fe632833465a3154028e7dfe2cb7d047223936b1de76576
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\favicon[1].htm
Filesize1KB
MD50961eb13ef799b1c1f2a335965f343bd
SHA15d7ce0e0c0137d85da4d7ced88bff2bdba80ed20
SHA2568ef0aa04db9fe87fe3e9d92103882dde1531a55f8c7fcbceda55f8ae4f501435
SHA512554458650ceec6f091e6451ed3eb46141d98deba5cab9fc54c0b956b90939caf5d846edc6ae4d368d88a964c2259f5cf9fcadc8f7e610b30928ea65af9b5c777
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e