Analysis
-
max time kernel
27s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
bing-wallpaper.html
Resource
win7-20240903-en
General
-
Target
bing-wallpaper.html
-
Size
151KB
-
MD5
7ab2c41f005d208fda00fca64e4f1bdd
-
SHA1
25a4b6ecd09f83740350709a71f334466b7038bf
-
SHA256
3398f45b09b312ed7269fff159657011dec9e775f9622392d08a3b1226279edc
-
SHA512
cd69e367fc91f165104d98394198aecc1eaf0494b3014b6e44c5b44b6dc8a5dd1a89c70d91828ec4f61660dc86e626875139eefd2c3346e411bdb50244fcdaf7
-
SSDEEP
3072:Vi7bJVeAQOw5MxamOPOCQJSx60WKOkOLuj20xpC:OeAQAOPOCQJzK5C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4C9CAA1-B1DA-11EF-ABB3-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0051199fe745db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f201268f19aa52429de6432634f81e100000000002000000000010660000000100002000000061d7ebcb7b327af68b441d695090236f5f56963e57892ee6387aef0f44ecd912000000000e8000000002000020000000a8611263f028de663f35959aa6bf56bf7e5cef5cdd90ffd09951a2ca283b5d95200000008ea6a3d34c7ccf5fbd6ce092bb38d595cf3b3c948cfb6286b9374efafb928463400000003bb111c39dec3073041def8395ad367057a0935f3520770b5037dd1feb2f69aea7c64ad334500ba770677b0843d4c37fb92dc9ca854863ad4fb335170a888361 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2064 iexplore.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2396 2064 iexplore.exe 30 PID 2064 wrote to memory of 2396 2064 iexplore.exe 30 PID 2064 wrote to memory of 2396 2064 iexplore.exe 30 PID 2064 wrote to memory of 2396 2064 iexplore.exe 30 PID 2680 wrote to memory of 2772 2680 chrome.exe 34 PID 2680 wrote to memory of 2772 2680 chrome.exe 34 PID 2680 wrote to memory of 2772 2680 chrome.exe 34 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1268 2680 chrome.exe 36 PID 2680 wrote to memory of 1344 2680 chrome.exe 37 PID 2680 wrote to memory of 1344 2680 chrome.exe 37 PID 2680 wrote to memory of 1344 2680 chrome.exe 37 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38 PID 2680 wrote to memory of 1084 2680 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bing-wallpaper.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6659758,0x7fef6659768,0x7fef66597782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:22⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2196 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1492 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:22⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1476 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:12⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:82⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2324
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f6e7688,0x13f6e7698,0x13f6e76a83⤵PID:2296
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3740 --field-trial-handle=1372,i,7451366364339090327,4000563928211140074,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5614af3ff96ab2d9d433cd12984c8fb05
SHA1b2fdc24a836154ad2851c048139fbef08ec374d5
SHA256843ffffbd920b191b2d87e9c78d3f097421d2e5063dc6cdc1b0eba52ef2e72e9
SHA51220c8082aa323b607678261c60f52e9fa838c46e6520c6bbc9a713985220c09ad80fc31c7e2fab0e9defba62e08d68d7da34fd08aba6d5e90e3b76e9debae2691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5cd1c9892f7302efce8a6465d2ed88481
SHA1b02d6291c9310183df89d8c05f583a223d50fdb4
SHA25646efb4aec6482969e6d9b2db55363932cab959a8f2addc709bb70db6ae26eaf2
SHA5129620b8aa75c02e6bb012e85283056fb09a61521e458bd5664e436860dca88836939e3e65badec33ec0e0bafd79e07e0cebe4369b5684b88eff8be12b00bec5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5f8e5df70b60899f2bd6089bbb5c78a75
SHA1e9a21f7db5ab0813de55959d3f47f7d293bcdb78
SHA256487f6f954149133d7ba2ad3c9d6d6e3d3e651079aadeeae502e66e135bc1da96
SHA5128ae0f86e8f3eba0c022e4e90a963355a4bc1a7f17042dbc8de31ffa47524578335e4171b551840e8e4376ad329fcc4868dc33c5e7335d10e766d67caa4fd78f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594596a917e73ef51e145ba9ab5f63cc0
SHA175ad58c437f4461f00703201530b0e193ed95eb7
SHA2568a71af0868cdc6a2c40b2921e273c24987b1767f1fc43b9b1a0d431e6519edc7
SHA512e13ea0decc5c11505d7a33e8672c2fe23e98c3cf86418b3c72bcade6eceb5291960cf136d463403551185b5affea9e632e0fed7b9a931db3deadd606b1cd4a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a2a42f143ddadf513d9931790d23a1
SHA1ecad319997dd55e0c6560989c1ce7b29d5d08492
SHA256c4b3c95d57de1cca9a8d82a22fe4d5791266d1e55e4540f0107c90a64280e5e3
SHA512f4a3ed139098a30d86c113b56e60d5e3e4583ba23470446a913a9d168306658669180938ac47f9483e3280f6ed9c8ad1339c2bb294308a860da407b3d347a00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f036a86464651db18966a1c8fecdc2
SHA157dfee592c41f6ef5692e7f1d1f94b39a2f5f7c2
SHA256bcdd52242c3e16a189cd2278e6297973768f658a95df9f5485db6072cc4d5fc1
SHA512fae3e71a24ea2de4d397584f940ecb627dcd734da6863a67c9f573aa4731f75e3de601843ac891f5799b320d1090a21e949930ba52f9a4e0114c7ef2f75218da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b1916a5d0820df0b3008a9c68da3d7
SHA1e710a0a9f214e505ba14b199f385dacd1370b8c7
SHA256e085448b26c8acc6b1f60254b05cf699e4d97216c00e59df641e22002e0b89ad
SHA512cba013667e3b224eb9c88fdcd7e33431faf14aee1a8c8050872892dce5443a455fddfed05cc849e6433a2f801dfba7a83117a8c46b42fdbbc0963baa6d5924eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55262e8ed11fde995f4d678014f40fdf8
SHA126be8d29ed68ea2525497c73acfd8d0d5f87c295
SHA256f99090707bf8a1335680a1530899950e31897279ff853ac0d50a264c24a25f18
SHA5125c4e43d44b0d81f6e02609235f397b7fc6a36b35de85aedabf6adee13833944f713a42f493fb0f9d8676eb557faa0fb94f171648d51062afb28327fa187cf5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a465383cc365f26d37423b56c90b0057
SHA1d2a483499927c65353a7adeb101370d058391cd2
SHA256f7cd07ece98128417600df133cf4f0ba832e0e1a67ed8b4386d7ad27fea0d589
SHA512d262e079e2d03b19fd59d5d60c706d6d09d43cfa34a6946aab430b5540b9f1d3ff070c898dcf449e165f2f03d4bddcb7fa3dfc9da83eef6b389bd2fd2d77fd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f9afc94d28da64a4ca39aa06a96c8f
SHA165d411481e57969f0243286237ed4109f1631b57
SHA2566774a119e2b94bc4f26fdb83045b003cd14bbb4d8e49a4d4d952898302761ea9
SHA5124a20dd97e96ea31a2960fe1bdc82da89de3ca8db3033e79bf6cce8e44e12228c9f083545b1067e8516f98b898a38fb6a07360da6774eb49eddcfb0d6ee12304c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55740c12ebff6c74bc9044c79a49e57e6
SHA13dff2ae8bd8cea0b09d4136e8609c790c8ca1a44
SHA25620bdd010a9de74409f0739466079182818f6b08ea4b82e15dbdb1de68b880efd
SHA51244d4cf752bd4ab69bb9b0f05f96e4791ea60e5ea37a1fbbafdb49d0b14ba54fb4a052fc3ca22804f5087713ce62bcba740ba96b982470a6c9547f65d9cde680a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e02640b1d265151c7f5206665aa0064
SHA1b961bb78e26ed1a74383304f42eda981d22e0731
SHA2567234e4496b05369875feb531e0033a5515c1df8ecd77d4ab51a089af2a5f2342
SHA512eb85ce5df5012b196ba2b0d31910657743d7cbb3e674ddd8b95438ce073f05e45c8d66a008f7b8c9a028d4c11af3ab896260c8cc13a687fae4f800ab94dd0fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695cc501016d671813c792bf5a763932
SHA1d098f9f4d0448375ad79982715ca06a0481e08fa
SHA256ad2687b14378bc381284c4e0517130f4a113573958a2c84da392fd85c4f3f3fa
SHA512c13f55c656d050b3a991f51e5176b9e75802fd6a37939a5e91c86b1790e8025803bd911aa8bdf786c68b0b6dbbedf9cc4dbb9c567cb4454bb3d7849cb27a6cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2eaa9749a3167fb2d56e545ddf4590f
SHA140d1494f29efd1fe83dda2a4bd4c8d5b8238ae11
SHA25607f4a4e675dbb56b65ff39b94c294a32581935dfc42c4d89ddafb109c6511522
SHA512a6cc8d0a3e89eebad4913e0f34becb41110b52c6f512fcffbc09d25d27c6d7c2de09d658a3395c2225e7deed2dd70f2189d19ac6b5b3512942b70cc1dc5fd3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce4fca456f33ffca3a911c1636b093c
SHA11ae8f30ca15058ff77f656f3f1f8ee411932f413
SHA25688ed37bf84c467688600745632d2eae988f2b08070160df768d14650c1c91936
SHA512156a47aa67f6c4a40c55c085d79cce61354e7fa5875ee8fb0aaa1da5010f54e5fe328f7082987f694be04ab31a0754a2ba7b65384dc26810ccb3886c6eb350d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d184ab76046385e47e801c5d2eefed
SHA11d173cbb0b315dc35f51c9ccfdae886cecb0e4bd
SHA2564c60c5141052b5d1f3b1218007611ebe60a11e7006bf76fe6253c7ce04b3a00b
SHA51280aa6c09c2aa1d191731cd1b0383fac03ea1b2e81e103fdc6abd646600ea8bee9ad3135ed15d61ef94b0bc54ffda3013e1aad098cab84b0a7ce174b6ff3e91a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704241793d907f8711fb7e46dbfaed13
SHA1979944be486b55ce015df3ae42ee5dddbc02e456
SHA256a0dfa47429f6321e14461f23f0bf61d55cea1b807df0cdf832136bf02f8013ad
SHA512263075375db0270af03a3648b2b7ae4859b0bfc96c0999dc99d92b58e26deb1f258d19ce9422c221351e8ea317dbca92b4ea2f1dcdc02a098d009df5325f04e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033de4845c9bae63967c229a2edb151b
SHA19678bc576e1b96789b16f1d20416b8ccb4232adb
SHA2568878614d7f92e309ab6b15ea53d80a02d08b7cb26ab74d3bbbb36a8ba1cdac48
SHA512f15ff254a9d60261d9067a72f71b30112157ab4a1609f9c4e362c4cf0b0a2f43a7bd03fe694388208ebd283c884d0bfb5840c52ee855b75bc14b92363519ac1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc0b89cadba2259791592e450558b7e
SHA120e028ceb89bec1f42a1e7f44443b0615469a72a
SHA256b86778510001e090b75da9d619b01d33d43f17084b9a2c9d31921de3bf3ea83e
SHA51229800c1927f32e86c29f3f7affb6fb2141abcc03a2a0e7b1b9983910ea61c7e392dd0504b21da5d72aae28aaf4b768d59fc4586645739fc855f9fd0769f443bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c15b1e3ef11c73166b40aa004cfab7
SHA13b3b6ebd74d128cce5cc8d04349c8936a5c165c2
SHA2565f4fff08d0170b1028aca443f4dac6a04ea9819d529b3ae8279f090e16fdbc70
SHA512261dedbc9414146002fa9cff5f7114bc6e7cfa77c333e4833ecc1e0edd163d2281c4d85b64a3654fed702e0ed6f83160d207ec8fb7e93b2e59254179d8efd317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58577aece1856ac5fbdabe2aacdb6b04d
SHA1ffb79b97c6b851373b805986cc2645ae97e145de
SHA2568b360030106d3c39a16f322657695bbfa0e137721f3bd51fca5add4f33b00daa
SHA512bcd9aebc82223aa5c3d0ed7a94930e6a0fa3380d729bb79a868f71a9280c3b65446a6d1af51d58fbdae271ab2c52536b02ae314783285ae1c908a42c4bfd3adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a275fe20805e908f3f9dad9bffbb525d
SHA152cc2f061ace87ed34cad25082abe8cf2273c861
SHA2568d7ef978e74bc6785865acba3a49e856aa5bf7021cac3947489d7cf20a58cff2
SHA512e943e35cc692059d6e4413aee3ff22ccc4b47061751ff340c2f26cb61e015e38c13b5fff7ea24d73dc28caf0091eede494ab61aad7229a91ae1f6a309077fe41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2062973689c7d339b588ec3942861a7
SHA16f08ae77de54b05cd0c37fee5a1f0b61975033cc
SHA25654bd61f0944cdf379c8d43a81cd2c3af1479068610045807e8baf65c7d1e369f
SHA5121c062ae279fcf15c3940568bcac9d9663d0773cddeac084f35836680e26ddeef5cd00340de9407925e1c995b54392ad9e319c13081d5f70c8dd22fd6874fef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f45c2134045f638eafebffda888f6de
SHA11bffb1d4c122862439e44302be82e69cb8733e70
SHA256389a2fa1b9c509950a5aa06c3c9dd0bd42830b503aa01ab6c15bdbc12867da2a
SHA512478f85be82b231a1a14fccb321fb3aa1799d4f225010ea9d2bd5b9dcfb9a28d21305777962e6afdcd25b00200ea7e389043f748d7ee3d2e2d175930d8ad782cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a8e1ef6e4456d0e7254368117ba8e5
SHA1be6aefa1d7f23d04c234e30b854eb5a00918306e
SHA25668cbfea6a9aed452e10808245a764b707e90268f3eef69a68f40f21f43dd7a43
SHA512456d4ed2aa59912399a5206eeacf2d750fe6ea2050344a9a1de7d6148284b7381436575988999a53805fec4bd85f575aadac5988af999565e67409ec3d8bc350
-
Filesize
347KB
MD5190b74b2cfa4f37edd8be79cf0ab6b7c
SHA17d1d20f28d605bd81a56858afed55fbf1d06c884
SHA25652f941e14e6c63521bf0064d6a4047aa49bfc99defd93af48d229f031a1c7ef5
SHA51233bd9c7d60b4842b299c2ae2f142f9c59492b54d8ff3d89d5ff33e89becce722204e9b2480e0c33551387bab13b7b684c9aa0068a5eddc83f7fcaeeca742976b
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD521f07b2dd2e39016c8a9f0a5a604f401
SHA16ee57694b2a6f130cc2216fc9fe4ce429fafec86
SHA2566cf45ab5fbb5b84169c1870f343d96781d9564b173719a55f6da55f62dce63cb
SHA51215c61ffafec759194bd716812587960d9ce5826e90918995eb4987ea12563bf1ecfc6f2a0b839c21acaea059183d62a4fda7ceecfe87fca54d3c1985c7adba1e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
347KB
MD5cb75c7f34a638c0112f667f9a8291f8f
SHA16be09fb829aa020b71e2f59fbdec619e070b36b3
SHA2560ee7f5132220d95c4cae31ef5bd79b9d9a9f325b72dd8b6623616bbf8be4ca63
SHA512b6e590a49e7279b395ff935b67b0df0cd5977e45bebd835437a98c29eb9f52c9da458a5d8460d2477984d554334b81280e097e0d43ff91aeb076355c485ac764
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b