Analysis
-
max time kernel
56s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/OWiRIQ
Resource
win7-20240903-en
General
-
Target
https://u.to/OWiRIQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4AFEC41-DD88-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2552 iexplore.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2552 2092 explorer.exe 32 PID 2092 wrote to memory of 2552 2092 explorer.exe 32 PID 2092 wrote to memory of 2552 2092 explorer.exe 32 PID 2552 wrote to memory of 2772 2552 iexplore.exe 33 PID 2552 wrote to memory of 2772 2552 iexplore.exe 33 PID 2552 wrote to memory of 2772 2552 iexplore.exe 33 PID 2552 wrote to memory of 2772 2552 iexplore.exe 33 PID 2736 wrote to memory of 2620 2736 chrome.exe 36 PID 2736 wrote to memory of 2620 2736 chrome.exe 36 PID 2736 wrote to memory of 2620 2736 chrome.exe 36 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 3032 2736 chrome.exe 38 PID 2736 wrote to memory of 2832 2736 chrome.exe 39 PID 2736 wrote to memory of 2832 2736 chrome.exe 39 PID 2736 wrote to memory of 2832 2736 chrome.exe 39 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40 PID 2736 wrote to memory of 2968 2736 chrome.exe 40
Processes
-
C:\Windows\explorer.exeexplorer https://u.to/OWiRIQ1⤵PID:1632
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://u.to/OWiRIQ2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67b9758,0x7fef67b9768,0x7fef67b97782⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:22⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2248 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1580 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:22⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1416 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3532 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3508 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3412 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2532 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1900 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3456 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4112 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4176 --field-trial-handle=1276,i,17351533108595818113,16018240805403613905,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5795aa7e8dd29d2484da420740c9491e2
SHA1ce69e81a627e0c16158f3a5e98e65a0f2266bf9a
SHA2563428d48dc96d414aa0990094215911c9ce76e64c0720caaed279d31f97c4b150
SHA51259425a53486fcadf9eeb405f767663a6005502be6981f92cc638c293f6deb61bf062f0fb8cf770cb784eb1a4a1d268f6597472e9674eaff3337f74394ef83dde
-
Filesize
363B
MD5a88cbcf29c92aa13d4e9d598bbd78447
SHA1899bf2e3976e57d7956f9a763eac778d225cf062
SHA25647cd7614f769a1c10e26774d50ad4096c83f397d0e5fcc20fabd3d94381ef999
SHA51251fa1055b61f59d1ffee9959ade33b5ec002d39af80961767466d34354bc3d93ff2246afa9132d1a2a7ba11e6ff6178869e921b2c240a04d3f9f293bd1c28175
-
Filesize
6KB
MD5aa050844f9d421b254dee66ebad718dc
SHA1fc5c808dfb5e4631bb00daa489485953587b52ae
SHA256debafdf91e10d741b291142f490f68286c3b79a0464c0298feb4f4ab3d1385a7
SHA5128a4fbaa0c7fbeae89f8836053359416a296d689816558da5c7803d0c8581a296ce8ecff2288006d571b663ad2e0bff7aaa6292c31558d641d55646d88165933b
-
Filesize
5KB
MD5722c858a9fbab9359ba81325d58eb885
SHA18622468a2a682a5b7f9badf6eddbdbf4f9826ebf
SHA25623a2c2778f4327d65ba4c0c9d24ff08118cf267e0668cf5d67c3a7cf8c32ad20
SHA5125ec9df74f7e9fdeb9a422b388850c77e2b9a564685b5db63c58fb4f518f7b6541c87f0d42d208c5d52ffd835d2f0183bf75098df88c7caadf1d53e2001237433
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ce95683b-4477-4c92-88e2-a3a220f35434.tmp
Filesize9KB
MD530ed1774deb71eb3a7215068955bbefd
SHA1682b6c9b203b761c0dedfae6da8b3dde99bf8219
SHA2568f9d0d303c2c369804d5c9e3c426656dbe472ded8d37458f60bf9c2620077fe9
SHA5125d43f765c8da11488ad83276be0f1c0d733bc6654859d767fe0e78c55132f7c04eaee99987039be2c1008d0e2e43525ab7e4ddeac14bf857034a17bfdbfbf768
-
Filesize
346KB
MD5c6c15e1b270178a7cb5c9590643767c3
SHA11536ca02c487834af591438361868b8a88fc55ba
SHA25619b2897ee64333697b71296a22c334d91ddb55c444e273372e0cc67d10593683
SHA512b92cff9e204dd9c52a89abbf45df7c1532babd63e247dd777ede555ccc59b59c6219aa59101c022773b319a25ec63d97485d09f650e0983b6b74f1d74ad36707