Analysis
-
max time kernel
1860s -
max time network
1862s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-es -
resource tags
arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
28/12/2022, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
MrsMajor-3.0-master/MrsMajor 3.0/gdifuncs/gdifuncs/MainForm.vbs
Resource
win10v2004-20221111-es
Behavioral task
behavioral2
Sample
MrsMajor-3.0-master/MrsMajor 3.0/gdifuncs/gdifuncs/majorsgui.vbs
Resource
win10v2004-20220812-es
Behavioral task
behavioral3
Sample
MrsMajor-3.0-master/MrsMajor 3.0/gdifuncs/gdifuncs/pinksavage.vbs
Resource
win10v2004-20221111-es
Behavioral task
behavioral4
Sample
MrsMajor-3.0-master/MrsMajor 3.0/gdifuncs/gdifuncs/protection64.vbs
Resource
win10v2004-20220812-es
General
-
Target
MrsMajor-3.0-master/MrsMajor 3.0/gdifuncs/gdifuncs/majorsgui.vbs
-
Size
7.4MB
-
MD5
9bbe09ece781fdbf55e632d73e006b84
-
SHA1
bf279167c8c3a0c4ff53900011f260302880edbd
-
SHA256
7ef4256b98b031c117ba233529fdfd90aa9705ee98ba0656a2447d4ef7f53726
-
SHA512
8e5d2d4a16d788b39020d300cd588630e01a8921bcf1931717126578f6abad6cb0ea6c7fe19ff085641dfb35d275e9bc0014f2c2bfcba50c05877599ec01a126
-
SSDEEP
49152:YXEHwXfZpRmmtKI+gKQW0WV6mAYlwJnNWIvcShsf2v/6TxImhwVa2t5Xto4EaClX:L
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4732 Windows10Upgrade9252.exe 4852 Windows10UpgraderApp.exe 4400 OBS-Studio-28.1.2-Full-Installer-x64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Windows10Upgrade9252.exe -
Loads dropped DLL 7 IoCs
pid Process 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4400 OBS-Studio-28.1.2-Full-Installer-x64.exe 4400 OBS-Studio-28.1.2-Full-Installer-x64.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\$GetCurrent\media\autorun.inf Windows10UpgraderApp.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\Configuration.ini Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentOOBE.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\ui-dark.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentDeploy.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\loading.gif Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\block.png Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\oobe-desktop.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default.htm Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\oobe-desktopRS2.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\appraiserxp.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\js\ui.js Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\PostOOBEScript.cmd Windows10UpgraderApp.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default_sunvalley.htm Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\logo.png Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\pass.png Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\WinDlp.dll Windows10Upgrade9252.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\Configuration.ini Windows10UpgraderApp.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\js\base.js Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\ESDHelper.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\eula.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\marketing.png Windows10Upgrade9252.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\appraiserxp.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\downloader.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentRollback.EXE Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\bullet.png Windows10Upgrade9252.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\progress.ini Windows10UpgraderApp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4500 2988 WerFault.exe 111 5020 4984 WerFault.exe 129 -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Windows10UpgraderApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Windows10UpgraderApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Windows10UpgraderApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Windows10UpgraderApp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync Windows10UpgraderApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Windows10UpgraderApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Windows10UpgraderApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Windows10UpgraderApp.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2629973501-4017243118-3254762364-1000\{81EFB452-79C1-4E99-AE60-C98E21722B14} chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 536 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 1476 chrome.exe 1476 chrome.exe 1760 chrome.exe 1760 chrome.exe 3792 chrome.exe 3792 chrome.exe 4604 chrome.exe 4604 chrome.exe 4184 chrome.exe 4184 chrome.exe 996 chrome.exe 996 chrome.exe 3504 chrome.exe 3504 chrome.exe 3064 chrome.exe 3064 chrome.exe 4856 chrome.exe 4856 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1428 chrome.exe 1428 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 648 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 4732 Windows10Upgrade9252.exe Token: SeRestorePrivilege 4732 Windows10Upgrade9252.exe Token: SeBackupPrivilege 4852 Windows10UpgraderApp.exe Token: SeRestorePrivilege 4852 Windows10UpgraderApp.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 716 msedge.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 536 EXCEL.EXE 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe 4852 Windows10UpgraderApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 5028 716 msedge.exe 119 PID 716 wrote to memory of 5028 716 msedge.exe 119 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4636 716 msedge.exe 121 PID 716 wrote to memory of 4932 716 msedge.exe 122 PID 716 wrote to memory of 4932 716 msedge.exe 122 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123 PID 716 wrote to memory of 1108 716 msedge.exe 123
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\MrsMajor-3.0-master\MrsMajor 3.0\gdifuncs\gdifuncs\majorsgui.vbs"1⤵PID:3452
-
C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:536
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\LimitClear.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:4964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultdeded044hf96bh4be0h8764h54f5a335e6ae1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xc0,0x120,0x124,0xfc,0x128,0x7ffdd20846f8,0x7ffdd2084708,0x7ffdd20847182⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6108031658776371453,2682410224096679992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,6108031658776371453,2682410224096679992,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,6108031658776371453,2682410224096679992,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=3044 /prefetch:82⤵PID:1108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 2988 -ip 29881⤵PID:3264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2988 -s 37041⤵
- Program crash
PID:4500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault8295862ch519ah4379h81abhf283b16513b31⤵PID:3716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0x120,0x124,0x104,0x128,0x7ffdd20846f8,0x7ffdd2084708,0x7ffdd20847182⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,15739032233142900197,211152556402141413,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,15739032233142900197,211152556402141413,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,15739032233142900197,211152556402141413,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2340
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 4984 -ip 49841⤵PID:3532
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4984 -s 36761⤵
- Program crash
PID:5020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffde6df4f50,0x7ffde6df4f60,0x7ffde6df4f702⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1708 /prefetch:22⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2328 /prefetch:82⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3092 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4752 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5752 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:5056
-
-
C:\Users\Admin\Downloads\Windows10Upgrade9252.exe"C:\Users\Admin\Downloads\Windows10Upgrade9252.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe"C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4852 -
C:\Windows\SysWOW64\gpupdate.exegpupdate /force4⤵PID:3208
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1200 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=944 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=928 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3164 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Users\Admin\Downloads\OBS-Studio-28.1.2-Full-Installer-x64.exe"C:\Users\Admin\Downloads\OBS-Studio-28.1.2-Full-Installer-x64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3124 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1672,3548372425466299214,4024859401394441333,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:3316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5c7dc17e9fea06c2e81fbe7ddac779704
SHA133f500824820ba9528f108ff5736c2914ca9eb78
SHA256225c8707aa87cbdfc6037b0eb6fa0fb700ce0d01cffa50f5d7534bbc83c97020
SHA5122b08400d15b33b2cb9cbf7fbce20da02f82c6916092c02137c29a7f6de08b950f4f1a0c2f9fa62a81920f444c5e1d9557e00e0e05f0b0d2a95e1074d97fcf86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD54bbbdb88a708d96e47ff1c258a4a57c4
SHA183b5b8b30e2fc8953525aeda79ee6bb6b6303702
SHA25651cd8906a33333dd9027d5bff1a34204dd27b866567b08f02e21b063026eec1f
SHA512bb1f636da7bbdd055124a9be6410ddcd0270e08b65bb3159e54983651a1120a4dc009a4ce706ae0d58a9ee539553a1336e3e570e4ec2a2111e260eac10cbfef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize442B
MD5344afcde43a65bcd38676f30b150ae37
SHA1faf8a60179008a3c4c0747aa02b3507f051eb09b
SHA25696f5443d7c42ab64f30ba1e43882e5508f01ee9fa782741650591a75f211588a
SHA5122ec72b4efcac8ef0900e7adb96450472d440514b712c830aa779360a3cdf49532221a67e9d853e898c86687e155bfae0ba086d44bc20120b3bc44060144c0838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize446B
MD5f13ef13a9f487944642315ca74af928c
SHA1cc3cf9123a7c984015f4305a6508106a02fb058f
SHA256a96b9b38220efd95c5d91192f03af20d59da59901ba923e19da3d75baf13602d
SHA5120323356611c91533ad32732e36a27821cad60aae8d8abf4bbc713d77740106160bbf7d92e3e1c57b0bdab4281758225a9b298b6d963eb108197b94bd724d5bd6
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
3KB
MD57b8490fefc87da65266f7decba71814b
SHA126517db727628b59a8be4faa9602f8f0c0cc0892
SHA256e6d5b073c49754b8f536d44a0a9ef653692d687f22c2c339d6cd3556568cf980
SHA512950ed4004c4dfd76e61e5213a86f09c5ac6e457a92e8e85beed18ab3dd766379e4db322ab3405b37550fc1bc1259aa161594936316a506e7a19033556fc83b43
-
Filesize
350B
MD51c0eb4ab04a16a55119173feda353649
SHA13f2804b73cba5edb898c4950a3c99d93033d5b33
SHA2565d36bf9c31ddcd03c38ccc00b50af7e25a5205d17bda645b3e1494a37e410906
SHA512cacab36ae1ac8abe0f1788763200bdc74f22df2b1f45c001ddf3f7bb87eae6eb12be7be98ae69667a38cd1f0c9ea9ee4a116321b67102a843b49a95d2d576c8e
-
Filesize
323B
MD5a5870d590df7d61d5cffee88f066417f
SHA1b76cbf9decfdb993c45f45ddeb2272aa46c98e69
SHA2563fec3d8dbfbb1dd37c3f491056d45bbf38a5c9854f7c426f225bc3028f3ab905
SHA5123981e268cbf01733a00b4e6a699e56de58d534b5ce0810e1c117e401691bf132789c2d3fb937b0e368048545e0de21c4bcaf4aeffe25bcb4463007b99110d007
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
3KB
MD52138762f06ba155315e5bafe8d8c6eec
SHA1b4791ab96af5233d5609d5799e82d86f204fd7a3
SHA256437386555bf6fc509ec24be7a004fddb1f26260d4cc5965210cb6d28019bbfd2
SHA51218d87206cedaffb1a1818047d803db6e775b14756bd7ee30b2be815d6529446a6403f79c7496349ef587514f763adeafbbaeffa927bdf86086e3835b350518b5
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
81B
MD5f222079e71469c4d129b335b7c91355e
SHA10056c3003874efef229a5875742559c8c59887dc
SHA256e713c1b13a849d759ebaa6256773f4f1d6dfc0c6a4247edaa726e0206ecacb00
SHA512e5a49275e056b6628709cf6509a5f33f8d1d1e93125eaa6ec1c7f51be589fd3d8ea7a59b9639db586d76a994ad3dc452c7826e4ac0c8c689dd67ff90e33f0b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\edgeSettings_2.0-2f9188b68640dbf72295f9083a21d674a314721ef06f82db281cbcb052ff8ec1
Filesize126KB
MD56698422bea0359f6d385a4d059c47301
SHA1b1107d1f8cc1ef600531ed87cea1c41b7be474f6
SHA2562f9188b68640dbf72295f9083a21d674a314721ef06f82db281cbcb052ff8ec1
SHA512d0cdb3fa21e03f950dbe732832e0939a4c57edc3b82adb7a556ebd3a81d219431a440357654dfea94d415ba00fd7dcbd76f49287d85978d12c224cbfa8c1ad8d
-
Filesize
40B
MD565ff15c0ff78c637110a9969795fa29d
SHA1e2cec7b8b171e7a8f211d1e774a24c6d05983624
SHA256555999ee79488503ccf32150f461a4a8129de4270d75d050860bb56d258fe2d4
SHA51220319cee3946b79c2dd3acea1aa5339f7857b9ec5ff622376e28c913d6d33efe476af8f0e60e1f98255897f7e6d8417808c66821bfb1c449599d7a37ad8437a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\synchronousLookupUris_638078441826932998
Filesize3KB
MD5cf05dedec1c2af3b083ccd2c873bb75d
SHA14f0f906fec07dc4624823443521a2cec942ec995
SHA256d16971e1157d9067fc447a70929d0f23efb612e69e53fb351e14553c2c18f3c5
SHA512442f50ae256ff024a63268e2d7fa1b7da68af6c726d73ac95a9300458397e951042c698a3d9d2d0c9aa925bf77e39208c47dcfc4534507f293ce312cfaa53a7f
-
Filesize
29B
MD552e2839549e67ce774547c9f07740500
SHA1b172e16d7756483df0ca0a8d4f7640dd5d557201
SHA256f81b7b9ce24f5a2b94182e817037b5f1089dc764bc7e55a9b0a6227a7e121f32
SHA512d80e7351e4d83463255c002d3fdce7e5274177c24c4c728d7b7932d0be3ebcfeb68e1e65697ed5e162e1b423bb8cdfa0864981c4b466d6ad8b5e724d84b4203b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\topTraffic_638004170464094982
Filesize450KB
MD5e9c502db957cdb977e7f5745b34c32e6
SHA1dbd72b0d3f46fa35a9fe2527c25271aec08e3933
SHA2565a6b49358772db0b5c682575f02e8630083568542b984d6d00727740506569d4
SHA512b846e682427cf144a440619258f5aa5c94caee7612127a60e4bd3c712f8ff614da232d9a488e27fc2b0d53fd6acf05409958aea3b21ea2c1127821bd8e87a5ca
-
Filesize
3.2MB
MD5c0b25def4312fbddbcc4f01c6c0f5ba6
SHA18d16a183d61233e7d6b6af7b3cafc6645ac2acb1
SHA256c0424d0ae06ca1e6e0249b40d33ac40d74075856d543ec0924884664fba52b79
SHA5128c67619747bb108dae5661688ec8fa4c62bc6ac38ee6ff14a4691aab04d7ddd870fee4262cb30624a6bd85ac1f7595af05311496b0336f979e7e5f797791bc0e