Resubmissions
09-02-2025 20:06
250209-yvk5aa1nat 1027-01-2025 04:05
250127-enyx1szmdx 1027-01-2025 03:50
250127-ed4qhsyrav 10Analysis
-
max time kernel
52s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-02-2025 20:06
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe
-
Size
3.6MB
-
MD5
a1a3bd4ee2c15ba4544965f5c5cebd18
-
SHA1
6a0ea0b1c9beb2db9905d5ffbc84130005d2cf4f
-
SHA256
32e8d2652212baf105519ae7cac8bc087931fc67bcdcf940b75bd2bcac037627
-
SHA512
b3364fa32f471efdf3c77f66fa1c9c3161c1fffd82488b62c2a7bd44d0f97651ef419ff7aab80bd69b0ab1b045a90fec48c7fc7dbeab20a3a404ca62204b113d
-
SSDEEP
98304:yQPoBhz1aRxcSUZk36SAEdhvxWa9P593R8yAVp2HI:yQPe1Cxc7k3ZAEUadzR8yc4HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3171) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3043 raw.githubusercontent.com 3030 raw.githubusercontent.com -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\QWQ3BOQ0.txt 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\QWQ3BOQ0.txt 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDecisionTime = c0f6df282e7bdb01 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDecision = "0" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\d6-f8-95-40-c0-30 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373} 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadDecision = "0" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadNetworkName = "Network 3" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadDecisionTime = c0f6df282e7bdb01 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDecisionReason = "1" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadDecisionReason = "1" 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30 2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2880 2892 chrome.exe 33 PID 2892 wrote to memory of 2880 2892 chrome.exe 33 PID 2892 wrote to memory of 2880 2892 chrome.exe 33 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2652 2892 chrome.exe 35 PID 2892 wrote to memory of 2720 2892 chrome.exe 36 PID 2892 wrote to memory of 2720 2892 chrome.exe 36 PID 2892 wrote to memory of 2720 2892 chrome.exe 36 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37 PID 2892 wrote to memory of 2056 2892 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-01-27_a1a3bd4ee2c15ba4544965f5c5cebd18_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e79758,0x7fef6e79768,0x7fef6e797782⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1016 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:22⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3224 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1176 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1384 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3680 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2276 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1536 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1128 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3964 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1820 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3924 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3376 --field-trial-handle=1200,i,17169535855859945770,1507446821862159694,131072 /prefetch:12⤵PID:2064
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1704
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD53648358652bd7fbe5ac89652c55fef25
SHA1fff836386f3be6dac46b152bd9fdaed215c504ec
SHA2564b635e1f8f3bfefacf83b351e784979ea1a19bcb051ec5d94163352fb3a3724c
SHA51295bb65a9fa4f8ffe5ac95b44847c6a8e144114ccc78906c057a13a75bb59e0c31ab4fbbd92de767ffe8dc27c0e3c882bc4afe5537957d291ac2e48b38b8e40f6
-
Filesize
1KB
MD5b4dd5058e35df7a53c40a6f83fff2c12
SHA16d0416078c58def7fa1f65ab5f9278275866f282
SHA256aa3f24ff1b8b06a8d6b030e3f18be1c7974244708f885d1baf3b6ac59f2bc657
SHA5128be1c97dd7f6913706c63929521e7a7af6d1b51ca3551a9b47347bcbd29e9da3f040b33f3c5180ffa8545bf9e40f373f25b5aa9c7013eaa7031bc49ab4d9bfb2
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5277354a94f108998d0503a230d74266c
SHA1788896a4fb60a4cd4b78a49897bd3647bc031350
SHA256cdc1762abb1990ae9931b2bbffa5333edae8b3c2fff8a3b32a494584d99cd544
SHA512c17f505edc1ab42127049bb1c7d5d91702d25cc2c4114ea67e2258f5c3d1e168353bdbfe6027cdad81f63cf5b0e64db926808ab784b5f90d01435fa349cf8c9f
-
Filesize
359B
MD57ec141263589611915a1f8fe110547f5
SHA16715b5c1eabd2422b68cd4a0515b701fe9475fb5
SHA256572be70fa361da0bc41ca2660a0eb57d6c15882aa611da553908d821669b5b46
SHA512854b41a2616dfb47245afdf834a7de6130f3661e84159db82fd486ab3bfbbbe37919e76d012d67092f4d9936820d1faaf18421a1372fe67d15103d4d8c8bb546
-
Filesize
680B
MD5a9334457324e503c13a70a4abff1b17e
SHA1502dffb8a7eb6a140278c788deace5e635575cc7
SHA256ed9a608260d147c83760e198c67cf754659688158894bc6d503f0cf70378a8f8
SHA5126e58fde211e0df8800ef4a72a1667db8b8decbe1e489c0e082422bff270aa5c0c70f65cacb4fd26d96fb958e26c59ee06938c1ba98a7527dec0aa2da4196eaae
-
Filesize
359B
MD5baaa383524b1b7a4df61d0ac80d209d1
SHA1b448b7e1ba59625787528eaed642c221d67f5a02
SHA25629e79102de603944308b8576f478f33889993552700d6f2a464e65f93ce7c920
SHA51200621faf895bcb1c5e4d03981701a6268088c06637f13a23da4b726d41c0074f077b8cbb6d13b47c11a328f57f47b88fc98c96d6aff0c2ebf12542e2940bca73
-
Filesize
359B
MD5901141c09a7b510b413d5a528942c484
SHA15e7dc428027747eb27403a600cd7aeff50495b53
SHA256323a659c0dfc703cc8a873ef3e15fea2d673f30faade8c4260b5dd04a10b4857
SHA5124f5ceaf2c910f0ec7af600823dd8846ea158f1998f66d2fa33ec0e98b8d08ef72ee81c543bc6e294452439300607d4eabd51052bc0045fdf464b81ddd550a76c
-
Filesize
682B
MD54159073e8d2fd33569d280d30a5b9b4c
SHA180a6c50a4ce620e7f74766e4984d9ae9dcd4e814
SHA256716bc5bead487742ca8a52e74900f08e326ca3588282d6206f8861a218164b80
SHA51202c6a9dc0c7ca2f0f5c354a051b910999f545cc327457ad3a6eaa591a3146eeb9d072aeb732cd50e555ef99e199cf3c3269a8f92fc25b121723a1f232cce9a5c
-
Filesize
843B
MD544666d93907b51c9e461880ae332d9ec
SHA1684ce412c97b55aeb7e3ead3e53112b1e1d45441
SHA256bf0c375f9db97c26bedca36493d8379ece48af2a0d91e5c77b7ce25c6d2f18ad
SHA5125a6d664c0fec0b89421f7ca974ac7daffd8db7b747ff53bbd59aeb2a084bc3213539f9c58f5f80e06fc1b7f0d5742a252f2fc5fb969089105aac28831b78b319
-
Filesize
359B
MD5d66c6c2dcfe2859552835425805ca072
SHA114b28ebc4ec6761b5a7dc5cb4a6cd7a80ddde505
SHA256eef425138d70cf918246b0ad740dae9d7179b45c2b10c93cc8fcb66eade809d3
SHA512e4c4af4ee23ba46bcf529516404c8b0ed8b7c47f6bc8f67cb40b7e18030a34982673b348d2817ade92bcc80d8c61c6fa345556fc8a406c50528e9e2e3e9ca2a9
-
Filesize
682B
MD5c488352f89217a926a87b54d56910cd1
SHA14e3ebc4ab3deef19433d38da1790239f27e1fcb0
SHA25643a4994a0aba12535ab787a769b6cd33d9d13e22d221f8cdd5618ef483500dd0
SHA512170777a681a3e9031f64e5fcbd77df241386ad19dd35a0866c6ee7d31f6e0f7c19eb5a90e516f17ea0e436c58c75cadaa6fb11ad2571eda81a036cdd37ce3236
-
Filesize
6KB
MD55d5eacad1d921872a1e676ed4fe17631
SHA1218498a1e2546d8876eb3e909028e02e8249968f
SHA25600dce29c084c4e46da3de74955690de5d84d7b874f9a72af2b631d688d4cce9d
SHA512bd037ec988ebb01972e3dbed0dd734e8f73f4e833d29770a56756878784dba51f4c687a569404a45fc979681ae6cbbecfe90277bfc39ff489a20f8145718273a
-
Filesize
5KB
MD58805e6b6eca15b512b73dba1d6c57c0a
SHA1502b0b7bb3b98bc7a298e004d1228a899dc37404
SHA2560dd663103f906c16d3045f49e453405bc6b614594ffbfc812558749c513d3491
SHA512e36ce731ce3a94bb7a2e75239c986ec5c1748f6c9d760fe7cd43bea23b9bb463ae007caeba2ab6ecb1511725d4541223a2f76d8fe81bc7de36a3b4e409f663dd
-
Filesize
6KB
MD50cd9d4051721b74fef5193b823c0ed9b
SHA1bf0f0bd48797eeee20a82140f9d9fd0c82042164
SHA2567158bbd6f701b487f82eb510d35f5e9a8ed241380b11523b0e9d7f3e662ed9ca
SHA512139bde189e26912a88eb370eb8486317f5fd153a91474959d1fbf1ce70482ed6ed6c203f7c6d973466050d3837d486d1d810fb88de5f9ac067fddc266a133222
-
Filesize
6KB
MD56ce66c56817de00fc44a51952ee40e31
SHA1f1b13380b84ac0d05cc7727f08271a29c8c79e6f
SHA256fb9f697f90dd5ed93eb47f2c6f0e845ec5ae35ef17f0b81d3aba8a1b33641f39
SHA5126356d1a39a43f326441f9830c623107614fa63ddefcfc839a34883a39c9a58633eec1922e04e8562976b54d2cb21db5312d2c0169d58475118b837ee177160be
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ea6de1cf-03a8-4c34-8a98-b5f85e7c36e1.tmp
Filesize6KB
MD568b7364cde836ff46df0dc3e9021af91
SHA13a27b21ed1820ef30bb2bfb0d535844b2be2ccec
SHA256dc7d88b949da9d0035fb4a661ca8466cf249b1228471a214a6143583eae104c9
SHA5125f4fe44397d39f773477fc68008b404d206f034588a8266aaa6c4c2012984f280ef506d036de57b3bc9ce4f53d2cac6d6a3c037b591a2466df82e8c06be80d59
-
Filesize
73KB
MD5912a984ce753a9e145afd8125b11a9a8
SHA113289d108273c29705e10b2dbed3bb3a0bf8d362
SHA2568481ce97ebdd6bea095f82601e0620707134c85dedd6352f700555c9e583a641
SHA5123b6880b896b88fc307593dab24e3f24ff41734ab05171bc08fb5883b385286f1c84f7f20b51d4c62915478ccb11789ac0c4ef81060b75dc40a6a4012b7ba7c0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b