Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youtubecs.homes/x127317x
Resource
win10v2004-20240221-en
General
-
Target
http://youtubecs.homes/x127317x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532791492890907" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 676 msedge.exe 676 msedge.exe 3124 identity_helper.exe 3124 identity_helper.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 676 wrote to memory of 2076 676 msedge.exe 24 PID 676 wrote to memory of 2076 676 msedge.exe 24 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 3456 676 msedge.exe 92 PID 676 wrote to memory of 1148 676 msedge.exe 90 PID 676 wrote to memory of 1148 676 msedge.exe 90 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91 PID 676 wrote to memory of 8 676 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youtubecs.homes/x127317x1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd2446f8,0x7ffabd244708,0x7ffabd2447182⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2860 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2860 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15207948696463682749,15849382754810856928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2364 /prefetch:12⤵PID:1224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffabc759758,0x7ffabc759768,0x7ffabc7597782⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:22⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1856 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4664 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5292 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5212 --field-trial-handle=1924,i,9060552935298299,3431742310138763432,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
168B
MD5d79d00eac4c38b534cde745bee451534
SHA143eb67b0bbef01d15d0550de82b61c5442e925fd
SHA25628f092b24a10c2026223588c7c575d72618339ba47f39dcb6ef9ed6ed8d822f2
SHA51227c94b4857fe8a85ba236029b146441ce0d5696d3728c30bd2cd45142f91c437a0891f289e51c6cf5900e887c4765fa63044cf26f6a1d5f894d5ac9d63a44445
-
Filesize
168B
MD55ed804c2f58b401fba5ecc4797f1a0f3
SHA112808e429986ae15e8fe05cf2e1f90e61b2a9a92
SHA2567ad989e5260472525e007987e6b0e815d375cb9a4f1b81c5dfd00ff749c61071
SHA51226bdc6a1490c818b7646f6a5859e911e468190fcfa17ba4f9f1bc781428ef90c341d1b1a8ba5eed00613c0707362cfa65c8a237e67d2c9d55c3360d2c8646ebd
-
Filesize
1KB
MD59d1f6680b2ea088d7d9402af743d6b72
SHA1509db2699a94d8979ddbb9686387f76d366f0f08
SHA256726cebcdf0ca5942e4f1c63f9891652fae44894a5993f9ad7b7850a5f0a2e757
SHA51220f4bea107c8a613b4c3a0225d9df786db3cd28703f7d7b03d220fcc0adb6af4505edd0b7e6a2ecd5d8a3d4ab4bd7b6bcadc868e9038d21172b9482f62c974d6
-
Filesize
371B
MD5f40d18c5662d4f2bc6b7c96b0a1ab5eb
SHA11ec3d9da71c537d113330784f6aae4c57711dd92
SHA2561ef2043f3a28a4d2ca91b821f87fd2c7a3c3ec54aa4bbe918178f91dc19ccb63
SHA512facad549cc055c02a7db3d2d0d148755ea7737a4e706f3c1ff200635355f35828a97555260dea82416d0689378f68c7cdb9735dfb0fd34426da4174d31f3194f
-
Filesize
371B
MD5db82ac4cd82a9644c8887b5b3c5b1d70
SHA103652c1b52a952e4e84530d7934648d81983d4b1
SHA2563c67d1b51e300700bbf36fcebbd856d2902eef073234b3c9d4fa694e14d07cb4
SHA5122fd6f76c21ec79dd19994d09fb14d7dd007751dd5ba961d40ce4de37ecd803d48f5957707cd8db433b1e63552796b2533cd6fa9abe085142f4e37dbb76ac75ff
-
Filesize
6KB
MD5ba074a6358c16e9b9ede224d34a211fd
SHA1027e42ec0484d02cf58400198360951ff19a6eb7
SHA25648626db3f66e2048a39a89601cc12248155c63bbf902188505ce5277e7958c7f
SHA512631af2605f2011ecf1f94ff34b16a7d3660e72413fa2eb0559d2c53b6c61ac2d2c0e963ec41ff1040b98433e943e663efd470e7d9ffc043e293b8e3581fbe60f
-
Filesize
6KB
MD57a72367de8a9ebdf1f14b0c25e762a5d
SHA197e654f271a1256d99eee7281f0ff6807d356aa5
SHA256007190e5656739460c95fc8490ca0d98d2d9e2d1c3d9551d5d44d78e750cc02c
SHA51254692e1dc42d20a1d2f5ee47881cd5d8d57f8af8258d5ff363a880512b9adf37b61b5fa2b8765ca154e9ef6443112b0dc338d566e3b95984fcf05df8cb745b9a
-
Filesize
6KB
MD534a920921fe2bfc496cb3d0f56e917cb
SHA10e746032af2ad0ed146c12863df78144adad22eb
SHA2569a8cc13329898dc6c06dddf22a5b6bd2a5f3dd1625794e173823ef120edc2f1f
SHA512319e2232584a707295e5e96ef07fd53ed85b8f13a0ade8ace0b301cc6788550c7ed1ad0941f88793eaf4ba20fa1416773a0588cbbb9bc80f22a08ab53e1bc373
-
Filesize
6KB
MD51636b48eff8779d9fb7b1569551200d6
SHA1f268c7bce155c6dd03bc1ba185fbbfd6f82e619d
SHA2564ede55eb291acb8ab46b13b91d121f44324edae6f22d415561e436851a0dcc8d
SHA51205eabed1ddbf04bfcb0f2acacaee3a2e8159663443df85dc98d3b6ecf95b293b6149e879e965b94d7385af08e72cb09851dac71d8ad138ab910b8ad8d9f12224
-
Filesize
15KB
MD545c3697264d5f84e56367616df050a94
SHA1af474b3a6c04b5c73a7304568d2021bea74aabc1
SHA256cfa567434ab1b19ceba58f1d6b2cd6f44bb79ed3c3d14a17277ad4ea624ee50b
SHA512e64c9b73e11c8ea6eae8df1881402a6032ef129690666302332ad5b7a54c7e29a3e13bdce268d4ea7d6ad8bba8a70fb3d5295833768d265c42737bd60d2779e3
-
Filesize
257KB
MD5885c530b0748de9fd6e10acdb7252e77
SHA1278d032876ff22c5b1892ad51a9dea9fb0e63aee
SHA25665a1d4a144fa70d9be31b6f03cd0ff541b113b6bd9769967461bb155f0ed6756
SHA5125be7e3dafb9e40aea4d4bd709e0c0cfbb66b4108e527bdd9773976ed9fa3dda7fd7f9a68810bed72ffec50013eec4520e6cdf8683af0f063ab659276cdb18ac5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD51af9fbc1d4655baf2df9e8948103d616
SHA1c58d5c208d0d5aab5b6979b64102b0086799b0bf
SHA256e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135
SHA512714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3
-
Filesize
152B
MD5aa6f46176fbc19ccf3e361dc1135ece0
SHA1cb1f8c693b88331e9513b77efe47be9e43c43b12
SHA2562f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819
SHA5125d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD55c22f0ce3919fc8034e501a6a094502d
SHA1d306e6c4e2b919dba113ec6ac6feabb323a13463
SHA256a3fc6de782aefa3c9f030f31ebdb55b9cef3b06afc79eae6a197b4cea7fd1219
SHA512a17cf6f47841cf7e725f7eba3e03083d76ff7402916ca5e8d60c66fe223755d912f77cac7789c0091b6c82aff8d5f48017f8b81a1b5590e187afdbb7ac8d8e93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5dba8dd4b6669fe7522ba7512057d61d6
SHA1b11ad845b28da32263a29d5fb2f09613e68b2499
SHA25612364ebebf105ebcb8cf4ffc218b2feb1e482f0e9f05b194b670321bc5cff25f
SHA512e60168788342da37433c8767cdfc2e8d4c877b39281d2afcbf64f1e51124547fc4c9987a668b280e98829af96a2d7b60a51a9f0db27045bb6c3f9cd444fd750f
-
Filesize
887B
MD554fc442e91694befa962864e5342d847
SHA13ffe72f132cd1a33b8ec655ab6a82fcbb3475f01
SHA25619a87583246a74e11b9dc89bd2e4289ff4dce59b61aa7f1beacf285ca6531590
SHA512e37f74c0bab3a4a541c988da7048f6dc78a2856f21711f7d9fe7982bfae0818a44d33f0e7cfca2de32610c97ed170eda0e8c714327e7c0abaa477f56c12b1e45
-
Filesize
6KB
MD55f495f936f365138338faee295d7b836
SHA147143737512a54fa324ad83cb5f5e5406b4a5812
SHA256fbfd0b0b16dc977d3f073c66028d7e72548c26c7da71e62931041eb78126fcf4
SHA512bf837bbb8c68c305b68e2ebff99ca81ea8a65e1c667c9083679218975c36852b2ed1c295c5efd45788288aa58ce0f1b679fef0708062c978de5f501d1615961f
-
Filesize
6KB
MD55f624e528a453b0fe05391f9cea29643
SHA159e993cc3a75af5f8c04c6c38e4dc3f206e40d0a
SHA2564bfd14b4d5ffad64bae1ba95f76d62c18b3528d07d9b4953b53fa9d7bb522b7f
SHA5123967745afc8b06412405394031abc99a0ce77eae8f42906abb3fa6ce942d9bb992ffefc3eeae6f2dcce7e52914fad33b9fc4f57d9af7da25359b3c7b6afb3374
-
Filesize
7KB
MD52278b7674b086be4a4f67cedfe9c8741
SHA1cca20bf6168655f1ae86680dc85d6be301e76c21
SHA2562040b44e8ec160d5f03c02b42f2598c9d72912823e4dfdbbd3a1435fc9eb0b07
SHA51280aa43ad76bb63673df5ccc14efc2fef98126cb3ccdf3715526b22741738d4279b82509cd8fb16b957e70851cbed2bb84905571b4790ef07d0709e7cd91988b3
-
Filesize
7KB
MD5c30b60b1cdcd1d5a62b08fb0a11172cc
SHA1abcc94b11d98b74ebb634c820f947d7e8db27c67
SHA256f08394c888e4e2f9b8bb46d61da3ce96cc8771b72e281cdaca0029628f275e72
SHA5126ae4742627578f8d4ee2a8615362aa1ddce267071a385589a3e2971eca9708fea7695153e913d6c8a40e526d44539bfc4d77494441b3862be3859747190260f8
-
Filesize
705B
MD5dcde3a41a8f7af7b7b68ce73865b929c
SHA1fc415fa16965f856bf6bc897af8a3e9304951fae
SHA256d913de04cbd3faea7f0816149e5ab207f0f243d11ed045be26c4a5a0b583466f
SHA512aae42bfbad20139c1b7eb0ce5e62b1a8687195c8bbfb14e251b2bb5d48f83946e019a6e5f85a5ef3dd4dcf7d6162b982054fd52eddd388cf197f64191fb44f5a
-
Filesize
370B
MD521fa32fe4008a479b7c6d653062f2625
SHA14ab894ab2a77310a0d52db7edc8c2972273ab457
SHA256c0f4b2b45d76c036c463d27cc03922db6378c412c388842d225263dfbd2aecaa
SHA512cb36d279a4fc1b06367addcc2a3cd70fa573c21b11df213b40420ef086dd83ba89b509e1f3d162bd845a826be8e7face2c61b66041edcfc3c28ea9ce1a44cc2f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59ed2be86b64d63ed85cd98521c929a75
SHA154a8f87d1efe2d50f7b0df01bdd8f798df4b9bcd
SHA256058a801ec17289dc5d70c06aebf4b1d49d5d8e72207a78e6a776280cb282c9d2
SHA512cf92414507b02e8d7268d29689422891f1554f00976d7ce6ccc578d037fcbd73d9b39a32016adb846fa3c4362f6ecf0e7efc9a3c5927d4db5c3dfc1c2d2538a3