Analysis
-
max time kernel
49s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm
Resource
win10v2004-20241007-en
General
-
Target
fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm
-
Size
11KB
-
MD5
09eeab1b61f3ad1d6d86b0e387ce7ea0
-
SHA1
3deb1dd145517c9141d0ef99eae2b727542f7d2b
-
SHA256
b0a46f6c23505e15c64d15e5c3be708a68d3dc4098c53cd0db24c9550a5c11a3
-
SHA512
57ff8471c338e490afd029f49be9b9731782aeaf8fa84d533fd09046511b4216248a9015490545c2519ae5681b32769e8061308ec963b2d5a5e1178127094552
-
SSDEEP
192:+u3d5a7061PAA4iY5XccWqJYpffR2UXF9b4p06nsGGfkCeGkcwDXFhFqeVvdf1uf:1M/4FXcpfhfHXFJ4p06BGfkDXFhFq8xE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000352613c901bfe9a7cfd0487eae28e733cb3a7b89a9ecfd8d03eae13586bf2686000000000e8000000002000020000000dde4d1b0279eb5d8078cd3ee56ffc022a45dfc4a34353afc86e0a2bc4661e92390000000745ed76a85643e5e2c48a00c5e66bfb1f13cc00e8f6498ef04d162cf80dd0b95083eac437b0165f400bfe10560014193e3e0bf8b95d426d67766d3ee40518d8f63ffc96d469e5493e7d796806faecd39cd1d79b169efc04f20907a9bdc9696032aeac5794dcc98c34f0b882803b0ad5c1b0e39e09ce0e4880141315a1c67dfadae54caf277339428b0129a38ccc9306540000000db5227c872e28f174688b26672fa59b9fe8a0c53d11201f7d146cf517de4d93f6e492c01baa3bede235b01038d78eab5c2dfdca7318b6ac25494550893bb663d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c2585f34ff1a1148adbfd8b5b9344fef57c3686b41ab8a8d8e53f6be184e41d2000000000e800000000200002000000008fcb577d8ed78a461b3f6b292b327ea522ec39c647fb6682233e3525ff28f03200000000dd3c5b0251e8b006affd3c7d585b568666d520e1dc410c73c3a0628bc54a1ea40000000584896999f8a243ca091f0e1a3e941baa3d6d824c259ffa76cd3321429cb2f90cb3083fcfae4d90386e6d17526760b8f02e1c771ca50d1651a4d1f59775d0754 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80055ca58e3adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCA0F231-A681-11EF-8AE4-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1996 iexplore.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 2128 wrote to memory of 2444 2128 chrome.exe 34 PID 2128 wrote to memory of 2444 2128 chrome.exe 34 PID 2128 wrote to memory of 2444 2128 chrome.exe 34 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 2080 2128 chrome.exe 36 PID 2128 wrote to memory of 1968 2128 chrome.exe 37 PID 2128 wrote to memory of 1968 2128 chrome.exe 37 PID 2128 wrote to memory of 1968 2128 chrome.exe 37 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38 PID 2128 wrote to memory of 1332 2128 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6569758,0x7fef6569768,0x7fef65697782⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=996 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:22⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:22⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2292 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3480 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2432 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2512 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3524 --field-trial-handle=1272,i,7848584796251082929,9139804681242114585,131072 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD565958eb6152310bd9a4125ea712b1e52
SHA1455adf92f7f3ec284ef136a0be7e94c24f5a24ff
SHA25684caa3daecb00fce877ffcc971cc3c7f3df668d7441939bb7865b206e08509cb
SHA512ff509fe1901b2f0dba83aa13fdd977bc8bc1964004d1479da2194ea0aabe4f8dd60c2601913f349f317bcd78fc52b22c8c505c9deccc8b484cba9253fe53012f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5dc17b9072d6e9186d3870a9e6bae9d36
SHA1c7ed54777e655edf0049d577ff190104a2e29eef
SHA256bb5f8785934c67e7fc4314dac6106a68e499f702da7bf99913d6284eb685ad80
SHA5124985f20f9095bcfe6f5da47e0acad93e066ee5b89ddbc3f20ee215078b8530abf8b6de0150e058104300513aa12a199ff002649f3e8213448956287787257d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9193e5472c68af2bd0ab0295176251
SHA1a369500276db7284cd286a9e063642d4b100e895
SHA256c526e9ebc6c621948396eaa1f49e571a44f49f88159708db603c6c4bd61e57d6
SHA512be1cdb99cb1849b75be4e0051f79c5326a782100f70e8bc427dcc7323836b4975d620da1c2bbe0df65d7ec1efc30b192a7671398cd9a2eb27bf7565bef721016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2443de9d28afc21672954eca4e8309
SHA10448ab296515335ecd747cfdfc20525ad841f4e8
SHA256d5be9fddd1cee6e212a83af9b729636d8d1506bf318b03dc943897752396b0be
SHA5128def332998e9e976b96a76f078285c55a1ab80fea9e1fb6ca63edc6b365f785b66252c9250695cf7b1afce7ba8b87355e9530f467a958c73c1f6e6a4a3980b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057fa16424cdde13fa3bf8c68449b875
SHA1afe4539ad57b3d159a99688958e93b023ba38388
SHA256483b73047d82aa688837efa25f0786a9d7dcfc2bf040a6c3ccee0a88acfcc5cb
SHA512f798433c7c9e40325f2ccb388019cdbc8ef7a132ed1f24e1803f0b4876dd6c15a2853d77a6eba707d0c0fe3e7e81ff9bb2eb8b60602cef0594addd6094e1d765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5be5cf83e81495f378efb2427d2ad3c
SHA1512c96eb37d35396352480107beba9657fd15346
SHA256efa81942dcff02576e9f6dc483ce374e3262f1d236f6718ccd1cd5f29536a9d7
SHA5121a9c2fc1a5a6ddb547c6085ec770f46cace7551798cc223c2c63b9d42006ba466ff87a6f5a10d88c95b134457fb7b0b0746ac4435252252931e98ebc9f98db84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac84029ae9d8d3b27ce5baf6e745891
SHA1bfabeed5a79734717f0c81d81baeb08d45f6105b
SHA2561bd0d7cea7bd5696623f52e8b29f337305bcf86973c6aad4af8b6783f7c7f793
SHA512e25fd704d7204fb086fc9793a47fd9ea476a011ca4e65ccb363a9341bc870dc8e9de432c2fbeab2e2ee37167661a3baa2cd658c833a14351f50e65da3a0b7a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50388e606b77abfbad38a9ee2f837a076
SHA1502ed1253d165445bc12583649adae9c32f9088f
SHA256a2239e65f2ab947e3fcd57e7147a1357264881a01eddfd7e480ef6c63ba2f301
SHA512200911a552f4b3c2bad80ca6dd1075f545ad3eacc938dbe79ab089a2c5113df22081cb7d6ee3be0bbf7bacee97e0d9e6af23e6582d6dff3cc177ab076b6a422f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124b6cc59df3a7e1a376d3f167799e50
SHA17a45524e2231bdcbfbbf67c1d334952b7db93c56
SHA25664ba1ca1b3d7a7c0b10ac88dab21db1e85f110780ffece7a1929e6f61288e663
SHA512678a24c37974e272cb653c3d60063402061c25209c8da99ca98ea36f6cdfcba5d20f853765be743f2d4e5c1ae4b4cd8da6dbe0233b11fe5183a7767ac425c1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8a37de157e40a85cd1ab34c7639109
SHA16072a70052f3e6609cceddd532960f1165b19da3
SHA25614bc71b00b478ed85139b98c1e978c05e094b68b6cd61bd4557ae5219f078961
SHA512270dbab2a0853f1b4bdb83587da63085a6fa5645af47efc5d7d07216942570f5983b1cd6c0f0637061ea7efe05f7cfc9559e6bb7116d7da1a70c238c088a0ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53701052ba07d9887946a664da4497216
SHA1463471443d5f427ffeddfd96d1f4ebaa4868beff
SHA2562dd103430e62de71d05418eff15a222e01dccd6790375436de2f4f0e4e009bb4
SHA5120f91af9e8b3e3b5fbb75ed65d510906f3c6493e6405425cc0606ee622523bcc98a1c835644b33eaeb30662303f424ab16c78586f4c048e2932e25084e190378b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c272cf11950d04ea34a7cdd40f592e
SHA14cf653e826d5221eb7adbd7a3c0bb582a5ab9326
SHA2561548a15b1646e92b835bebf91de9ef410f3c6afc9389dddfd165be48a6c22c42
SHA5128e313cf8d5de75ab02139a47f70b8e455d60ec65cc7fa7ac304faf7c67746897041664e95d372f6201bfa0cb5c3f96a237966c77b9adbe55aa0b10cef6b83d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547fe7b4dedf4e31e5d38102b6df762de
SHA10090c5305f795f116acc2aeec3aa220072b6aa0f
SHA256d4887b94118377a23dd7295f26f05bcf759cea3c787b238e246df54e4565d873
SHA5123a20b94e68d98c1f9b64c89e1c2f2ab5fbfb4b8f297aa3a252ed1cd478a97c3e904f52b50ca88a91f8ec2a1fc0125b47fe5ef69b634684be9dc4678fabf2935c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be7431df06287b17a8dad3f3f64c150
SHA1e468a0641e3c6ca076e95a0f4ddcc1d98acae2bf
SHA256b87552af13f2717d4b4766edf383920c90bac701675a7b6e8e7a3e71512e59ac
SHA5128b8771afe7fbd9df7c78cc32132ff3c49dbbab039e9d3366fb8e92af578100d321baaaf6994db43ac232025efd1faf80efda17e0f82f327c04a9ceb0a6523bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2d6a4fb44a6581487302b3dd058065
SHA1a3a7065bf152c7df176dce2eac5ff494bfbd41b7
SHA2561473b830fe34b42fb13d4030bbf5fa682a8797ffaf576cd8cfa61538dff277c4
SHA512c5a70b91b28c4d2283207e49994c61fbd3a355c0e52a8225fddefac3d478590f7e222be39834f580caef564e295f17782c570956224705aaff00833c1ed21ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfe1fb788649efa38d5dce837532c71
SHA1af296e585e81a834400462821899e65349d71e2c
SHA256ca42a6ec2e9a90591ed76f4c533dc1de90a6e8ca9dabd84666b5c083ba38e81a
SHA5122fa78c814dd79243fdd2a3f211d41702cbd305ca07e052db3d4e83c6595cf5a2fb823520ff6342c23e52a9ca77c400cf76cd12413a9e52ea2f9968f9188fe5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ca795d54e818ee1d132393abcd0976
SHA146eaa4e902921b28781e75909d6079c70968b5db
SHA25697ed212c858805e985722b9aad9434b0a8dfc43c115b692d3c0d3b7b818810e9
SHA512ff5402c33756c86e24de5ed299b3295f6866a07583fded80df0759862c8f7b4863fae8709c150c84d21ac1415f30c8a8ed82cd25c3ffdf17990b87ce48e85f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f18e941693c9ae0b2c8ee728a9c4004
SHA14cc7412d36cf1491b4cd51509b82ec2966639729
SHA256479e32a933c8bb41d27bed69db348901ba58b827bfae37bf0d6724521db48f8f
SHA51219adc374271ca18e833d81e355d985e8c6998d4abfb556d5e8a851b71d899e44deaabe78bdeddd999b4c9c5c3237babbe75c0fcfa5e3a2a22f1fa205d6996c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e5e6e2cbdd56b3fc38dae3393bfcab
SHA19ca9818de17b0ac7f819d95e8d4f32fec1f5b1a1
SHA256e4cb539739c159ffecbc5432f294d319c4ebbb5f29ccbf3824b338bd69790448
SHA51212bb1d75a4b0c4d569f4ce9bc25baa05d100d7806f00b15df724cd9f0fe4bd56ef18011288c4acbf02a3d03bdc93e6fe0d7375daae53b97f4f48f9473286f5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afd37301cb39aa12d36e5fe443e5ad5
SHA1cfd7972fb0c90d3b542bdf4c1a627f5618d4e84d
SHA25659441ca59c22c38b42b54a5428875d2dbf71b6e2a38ddd0b1f49a08de37ae3d4
SHA512a3f753d391a9f0f2692dcb3f9f4e213409e92eaf92d590f44092a9fa220d0be144cbb96efbdd084885a8c7195b1803e77b552225fc2608b27b08441a9f6a216b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD52dd11bb10cefb24b824d6aca8dad84e1
SHA1969b890cf673254114153802470d023133b64b56
SHA25683291f565b38ab0827798cbf11906731a22fb1e35ddc78aeff79343d5ebb8c53
SHA5123cd3975990ad9a5739e7a0a2f9678dca404739fac7b29f17a7cf452f2e247a9fce7d95ac9a23a7ca62b899cf568dae1a3be396ca1d2ae729dc3814fe61b7e661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55fec43fb35bc9104af8c2512921c3ad9
SHA137af4803515eb539416d374157f51c4fd34074fe
SHA256d9dc134cddbadd9ac472c44b79619f6bddc971ca6513aae7caca03cc2d7c11eb
SHA5127f368d09ae11fcae96aac6335b9a378cdc342ff9aae4609b8780b29ea26a26748d3f602355962bf85b63ca6937d97e46d7595e4fda53b55f95b588a15903e755
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5fc66ee1556ff2ed692f41d602690437d
SHA1ff3a483282db00516bdd158f170397d46ad9a3b8
SHA2562549d09973c7e6163fda101fd0f8c2b2aa8bdfb40b419847a0521cde277a683c
SHA512c2eeeebbe63e6c294e0bc71ac1f1f85e08bac6beebecae85c75efc807e4c3df6a406e818e4b1b175b88a494eec67d951b6321556a2b4034fce9fc495c4f98637
-
Filesize
5KB
MD5b0b63d20011ced425a1a41296bdb3293
SHA1c997fd573870e7bfac24223bebba99a335fe0e20
SHA256a012a54f5b64fa0a4953c2a2638497b031fbea386793b0fe4279df65bac5d4e0
SHA512ab45fcd3775949eb4dd8a6da9fa015991ac37f23ef27ee645a8a7116a4c3f0810a03951c43f22459bc6d106457a617fcbec1431cee848ef2abc17edce9459cda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b