Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
97s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Payslip_Amendment12009.htm
Resource
win10v2004-20241007-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000dbb3a3eb312088f8931128c7f0991eb3ffe1347a07503ed1eb88842bf25a91d4000000000e8000000002000020000000f608abd370e62677e950e2a0d7cd458cc8f0cd4f0c6e62f47b7d11f375fa80f3200000007f4d5e2a57d1ab7668e40127405098cbec72e46e431178510d64019e1798602540000000c52c8253a7ada3bc239226b55625b469b1119dfd9a95f067bb85a5890c6a25270d04c74f54417927b336c6f72a93b85d1c76093b0942d0499b742ac89bb13ea5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439506211" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE152D81-B27E-11EF-8B45-D6274BF0F910} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107285b28b46db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2596 iexplore.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1560 2596 iexplore.exe 30 PID 2596 wrote to memory of 1560 2596 iexplore.exe 30 PID 2596 wrote to memory of 1560 2596 iexplore.exe 30 PID 2596 wrote to memory of 1560 2596 iexplore.exe 30 PID 2084 wrote to memory of 912 2084 chrome.exe 34 PID 2084 wrote to memory of 912 2084 chrome.exe 34 PID 2084 wrote to memory of 912 2084 chrome.exe 34 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 1472 2084 chrome.exe 36 PID 2084 wrote to memory of 2268 2084 chrome.exe 37 PID 2084 wrote to memory of 2268 2084 chrome.exe 37 PID 2084 wrote to memory of 2268 2084 chrome.exe 37 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38 PID 2084 wrote to memory of 1500 2084 chrome.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6999758,0x7fef6999768,0x7fef69997782⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:22⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1452 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2100 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2108 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1096 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:22⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1396 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2436
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fb97688,0x13fb97698,0x13fb976a83⤵PID:2744
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3700 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2576 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1480 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2356 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2612 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4000 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3764 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3860 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=576 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=772 --field-trial-handle=1368,i,8290896856610594622,16851732779732214088,131072 /prefetch:12⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cc604c9c2139d433619632a3f919d0
SHA1def68ba565b0931443631ebd13fa7f123ee75182
SHA256967a08a132e37ce6c046e58d3d5c045fbf4324a51b02de299b1adf52bab3acc3
SHA512422605cce1a87cd90bc8dfc9a348247be35582a51191bfbb7395d3a84400611a9fc8dbcf751a687af83f6d02b2bf856ac7f09fa310ae9d4235d0774c973f9526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b51964e10802aadd9e6815f246d0746
SHA17c19b607a135fb26c3723775fcd58d394cca4230
SHA2562acba5cb304567d9268a5dc064b36bb4a9c5a488bb6ead07119a02af3b6db5ce
SHA51222cc931a0dd3528b6a8530e8e65ee9c620df1017bc5349171c8ad2bbd142139a943a03a9158147b3ff865b9b7b3632df771ab8fce7e95d3d85a6358a77d3b978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597514d6df1cfd09c08f068713f7f2822
SHA1c5b85b82fc738d0fcbc6c7725f4052c1f464570b
SHA2563941a68ad152b036198e8ee8b08b21a56a25e7718801a8efd5a562b52811d518
SHA51217478538aee22a61d1ddcbaf5398ff323ff4b8979e7915a5bd90918ae227642bcabc36c514f75939d9465f6291c0a2bef9cafb5f2176ac584cb43d96650bcd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2cd909cfc3607f503119731be82c185
SHA187b6b2a29a1dd107bb758c5ea9999bcbf50fa163
SHA256891d8a699d06b06f23c899800a592f2bf7351eb955ba483009e2b58487786a8a
SHA512ae754383e9c75d036aa25cd2aa6ba90bc1a29f5b66281e3a84399e629a9d7d22c02ba817dc8439a59c64de621708840a9cb1445b1f139d67a63a711a77b1b6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429ef241fd05734a8f87b62b5cdfe280
SHA1301a0ccc532bee6881346e5a0e65ef494057150d
SHA256ababb0dbfbdb3080e3d12b0b3b178193b29c67b4b42ec60b793c88a021912977
SHA512490be0eea68d54a791239f8c40c5cb7059d313311907e74e007bfc559f78dca7ed084ead77a15de28b961eca90f4fd375c07470b9629035305d36e81806befbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e5b9f5eb35ad5fa2af512e25e516c8
SHA17ecf7ef4950dfd3c4b9f32d6f069ef4aa95ec7b9
SHA2564a8f39a8e38cbcba9db80407a4675c2f31007f7a2c0cff43d85e5e807981bebe
SHA512000c25c0c247caa00d36ce9b71395dc63184e1d130b5c6e739d8aa65684e5f4bed3aad870d10bca4caab5971f001984e9fdb32e5e87d2babc0fcc03c6ecda0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507783cfed5286401320f59872fd21a5
SHA12a2cd775ae3d33123b7dfb5f4579087bc9ce743e
SHA256605646b855e3dc6c3766b0b92b3c3fa20e00894fa16e9324b7643ca808ff0f4d
SHA512fd19895c4de34794a4f387b2343b0bcd15feeec54fe3877543ca908b371d0b7862a0bc53bfe22e363e683b1f6f500eb08b55009f73929bac7bf324fcd0a50ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f0a83f4117b5a37db0b76fa366cfe6
SHA152dc13d9705fc631fc2e145ea53b1c5243375393
SHA256995087d6c6ca05e1f0f19b10741e7f13547537b5ff7d97c30c4aa49801e41aa6
SHA512590c34e0004d60c8729f2c2419bae5dad5fbbf73b96230d75de7181ac4f9e68132cbae65621dda60d5716c0cae3e0f0484165ef1d5a085270ec88501f7fa931b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca185fe3ceb96126711169a9d1979b2d
SHA159d29d74d4c5eac0b426c5e2e548dca68ca1b6f4
SHA256af71d950fb34df75f0c5950d1a10c6e3a1461790ac7517b0abf34983f4acf51a
SHA512d095dad346d113adbb2b1e6517e854efe4e6a4bf5e5c2f425fd776d01a93aab569a29460dbb3e99948cb6f52e1aa897f23e2cd6255076c12c8386f3b303da417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c72b01e34e92727d1c1d26702d70fc
SHA13a0ce0b0a4560d2c3e44eba9f059946ae163b78d
SHA2569dd116cbc25e243ea7b67b571451b8642e4b6fc3a4af429771a07dc01aafb651
SHA512ee1c3c5ad2916d804aa96ba12739a5a1824d5f73653d3bce784f0ee3f91efbd66a8aadab1c599305e0d55c2021f4ab27f585d7ad4b4dccc71d25fd43e581b1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557457c46c6048d3440883d9d6eb4e020
SHA1923f4a6c065c7d178b41064c68a5800708cdbffe
SHA256baa0c5980e0f7c908ce0e5f04430109d3296e339be8f8d942a4f2e0eca415000
SHA51298148b9714fd70d33a88a6ef74be8945d9e1ff3322460caddb22f7af4a2290724e368ef82e322492bbb25e91bcd04e8e21c538617894e35d4bce81d53ae18132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc3debf043f84974834d0f161142ddb
SHA15f0a0d6021baaa001cd1dee006021df41b2ffe86
SHA256017b97c3495f4ae9db67623d1bb58bfa1a266e01557086a11f6a4f133e13b23e
SHA5124eee58b7b22a904109f99a720963f72c6d5b0d3b9cb5570b2c945285d20938347b7b30ee9f5a7d3db391fc04259558c7e7854f14eab7f16b8b437bbab6da34e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92621fe4bd8df94ddb31dedfb71b463
SHA1b7d811c0f44dea7fd82c6ab3c3c8593850e867fa
SHA25633eb5b3cf6e3af175ce5c49344ca438386a67869b0a40f0693458d0da9b22b68
SHA5122ece2287896e9c9da5c605ed2bb5a2486663b34d51ba519b6a645015dc8fb427f69e0b994a165bac85c4602a25b078726c120b0986e3228125b980c685e0250e
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5e9329ddc1cefc620115c57049b700de2
SHA1c0b813ff1440d6f0084bb88f0a72676f5008f2fb
SHA256b60df061db8376e0559893b07917668c73058485c9fc3f59da0a9e948300e1c9
SHA5123f86e686bd4e589622bd5a85b9ed7d4916d7b7eb6673666a636e946f97b1b3d788eaf76ec94a1eeefea7a8ff26bc3e6cdb332723352939cac669795edc674fb4
-
Filesize
6KB
MD5ed93bc6c1d6c70e5eb2b9d31af2d9573
SHA154521fedc4110e5fc15fe8ba8c548deb85540890
SHA25688dbb2668849cbfcb51d028066f73c7e823876a79cc868a8ebbaefca4917c510
SHA512eb4655c04caf2ecc38cecb872d1cb70dedb0fa6ee76f3d1a435b435e11fcee096613e740e7cab58aadf256b36288f454c0d93dd48291a17f7c224c2429c9546e
-
Filesize
5KB
MD55832792ca871b296ff5e9f272c266def
SHA1bbd8f5457d6d3b9f6a5bd9c9818e92e6e4f67318
SHA256a1731b99f4df470aaa18889b294d02b3d1761919a361e312f2cd99280a480053
SHA512769595d6f17f83fa1e3b16222c3158a227eef8f275b07147c88a5e915b8197a5836cbf0b68dec67ac5ce48941e8c5a7c4642360ad8a3e45cbc97f21211136b1d
-
Filesize
5KB
MD5cebc2134587a735e3281079128b42700
SHA16f07e95761c79ff70ccc5429238b6dc7f0bb9271
SHA25692f30318eb86caf01d42f8ea0a0b930b27b6e4799c9e198d005a5083fcb77d63
SHA5127ddd4a89bc41ec63cf471a65e6252e8ae245f9b1a5fdc52cebc73e3a45e78280afb2f0c3d2c6dc50d37fe824c563dd58190285ac524b77422c2731b4abbd3f0a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b