Analysis
-
max time kernel
390s -
max time network
388s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 12:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/JhwEEYrY#MieQ_C7x26wJzounllk0BQ
Resource
win10v2004-20240412-en
General
-
Target
https://mega.nz/folder/JhwEEYrY#MieQ_C7x26wJzounllk0BQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576561606647423" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 2164 msedge.exe 2164 msedge.exe 4896 chrome.exe 4896 chrome.exe 5528 identity_helper.exe 5528 identity_helper.exe 5616 msedge.exe 5616 msedge.exe 5616 msedge.exe 5616 msedge.exe 5292 chrome.exe 5292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 828 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 828 AUDIODG.EXE Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2020 2164 msedge.exe 83 PID 2164 wrote to memory of 2020 2164 msedge.exe 83 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4972 2164 msedge.exe 84 PID 2164 wrote to memory of 4344 2164 msedge.exe 85 PID 2164 wrote to memory of 4344 2164 msedge.exe 85 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86 PID 2164 wrote to memory of 2228 2164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/folder/JhwEEYrY#MieQ_C7x26wJzounllk0BQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba2d146f8,0x7ffba2d14708,0x7ffba2d147182⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3140488229149925998,15103066239405919589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb909fab58,0x7ffb909fab68,0x7ffb909fab782⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:22⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:12⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:12⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3504 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:12⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4332 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4484 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4632 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4780 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4644 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:12⤵PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4612 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3380 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:82⤵PID:5784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 --field-trial-handle=1984,i,5205055139227740410,17961894883651808109,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD58e255c1cc6257167a9556bc099c9af03
SHA18f10b514c8ec10a7b0995b524abdcc3926717fa0
SHA256181f2e27697bffc750948752bd4777bcaaf09145e6cc7f43f0fb46aeb91eefa4
SHA512a977d3500e7bdd2fd46dc5cd02b543ec8f0582759499d2ea8aabdb716e3d9a153de77c8f0e8cc5fb980b3e82897b940623271ea6e322d8df5fd2927eda595898
-
Filesize
2KB
MD532225d0796fda433177e9a10d3900325
SHA1eea44e89fa7d0dea5af88e64353872489fdfd547
SHA2562d6276241337d44768cd87ee67c2d99386b3f4cbedbcba7fe972d08917f11b04
SHA512b6c569eede7febe93f4d84a2690a0299cddbc30d2e581b1b53d1d5bc4d4958063fec3be01051d37e71581ab9c3f01449c776eb11da60f8634aaab2723adc80ee
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
517B
MD5ce1871034b115e18389d898238909928
SHA163780ccb70fea23a50000b6c2877529fc87eddc8
SHA256715054e5f9bf2c97c2b2e4d4def27942128648f064b1a16db6ab1e10f4cd9dff
SHA5126e224903f9565f5eb3ae17ec9eb31ca0701da752870859aeae847ffbfcb0d2083c9e233c9de32271b121ed191f9aff5282c06ab0ee442e58fff4732132477022
-
Filesize
7KB
MD5ed9ed1364d2016cc51f66cc10422996b
SHA15dacd4cdb20a9d847e266ce0f28e197f3e41ccad
SHA2562fa23b9105437420500823f1012d1d0be524a49482f1f594b3e459ab1b78d824
SHA512c4c37b634457f417b929f83645619f2fa3422a0017e821760ad516eec8a274049017590c767fbd7c01c8e1ed0275cc3abc3dd04bed22fbadbfc18e73d0d9ae96
-
Filesize
6KB
MD5e78fac13f272bb0608fbcd632c22a522
SHA16ed464ef995d722d7ef2abd434b7e2b9915cb112
SHA256d925fc2af92fe4e2ccbd6e5ff662724cc78c8090fe8c1689a71b421a06188946
SHA5122fb4f1435d2ef719e3b1466bcaed1d2c4a0d461736de2b3449c313567cd408b3a3d9bebce281ea9fae00b0ca1bab1e95e487f06e04c44b70252795e0f21ef407
-
Filesize
16KB
MD5c12fa40e9d7e5af87863f893be33f3de
SHA144cf0934abb8e2ec1b1920a68571fa6b016d5787
SHA25608205a6e914e465b86c1bea4bb3712596445c04ddd61e4364ba38ae6640e72a4
SHA5126d38d06bd9578a71f8033dc79e00d12af9786818583bb095dd54eb3763363c8653c0ab658916273d8abcfeb87e1cc606cc4404fde7916f120663c33ae626c815
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c2d99ff041e8f19b8c04e1a65c05618d
SHA1dec5944bb98bf07b3aacccd0feb8268bd1786dc1
SHA256bd55062b171a45f2a6214032b1d34d999804a76724018d8b945a836fb780d9cd
SHA512ce937a4b9f9f295cde3da121d2c0c2b74564d13ffd1e4b65789d769932ed84f7170187a53a23542d0091ca66cd067abb3c3923b8cba0396aabf7fa0d18b0e585
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f4c0.TMP
Filesize48B
MD5ec21ca4adff6d1b79d3018e5b64b0023
SHA1b05b69d061173d158c380fbedf9a827f6fec06c9
SHA25610684f7cd84f4132946488f457d2ac70bf318c682755147d0bd78a73048af6b1
SHA51299dd1afca80ab0a158ec19b4c2c3be1502502cfc90494e0be25d1914d12afd8c23b75f40a8e4a479263c17c765eee39f6791402204a628f57286b96585f06338
-
Filesize
250KB
MD520ea5d6871c676063e1a44700c990eca
SHA1324b484ea506f05d776963cd162a1bf70b968941
SHA256fd1058b5357a9375388911c9eff64a4b6a6822a3275b99ecc6203f0fd545bccb
SHA51231abd1382f940f19f51be8aac657ec303bd05556e52352ca1334bba4795df5bf33e1e76761ac2fc31b70212bf6c1bcb93c3954d32760bd593078a427ac8ed08a
-
Filesize
152B
MD522bb6af63c7710354ac7070e45ac988c
SHA134d29d6b316e39ed8fb8c5efb42c4269040fcf1f
SHA2561a70d5d3dfc04e6f5cfec1ceb06676039229f895f30007fdb55b043ed48ab4fb
SHA51242c12820b5237caa5b4d5149901f84db6619a69e85cb869df06e07b3cad1b51e0c2d0545ee0129cbc8e7947fd8c2989def537ad2d58a1d5bf2c2a1bf60041ca3
-
Filesize
152B
MD562677bdc196e22a7b4c8a595efb130cd
SHA1bd2adf18caf764c8f034c08b6269d9693875f3c8
SHA256b540616d7e73ff22642f4fbe2bea0f9daa2f1166391e76cf817b2a93e0bd41d6
SHA512d23c3b9662eea6a75382242fb8e8084abc1127afbd2632f161df71a2aefaf223621511e1bf6229cf7e86313101a8d9dfe2f20e1c0bd481066e1969cd6fa75e32
-
Filesize
21KB
MD5b1dfa46eee24480e9211c9ef246bbb93
SHA180437c519fac962873a5768f958c1c350766da15
SHA256fc79a40b2172a04a5c2fe0d5111ebeb401b9a84ce80c6e9e5b96c9c73c9b0398
SHA51244aefedf8a4c0c8cbc43c1260dc2bbc4605f83a189b6ef50e99058f54a58b61eb88af3f08164671bad4bd9c5e3b97b755f2fa433490bef56aa15cdf37fb412b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5b68eca60ea180e999f087e3c5b1191ae
SHA10507f5559dcf0ea429e3b4565788a47ffcb09beb
SHA256bedbf4dd58ca508ecdc819e997acdcad527c96777ee0577932897810629c5c1a
SHA512fe72e4b869e780b4dd00b5e3403ffc5136dff09583557dbe34a47fd18847a8ab3c14367b1fe694f9da47d8bff94ea8fc1b71f0993989e3dc9ce7ee9ae8de0152
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
6KB
MD516e9d06627b4fdb6a63bc65ab21c3d07
SHA187321e714b6730bdfa383f336aa0fce38730d61c
SHA256d17f73f12c12e1806eb654b8a2053be0bf975d5c79c85d880d1ddc5840a9191a
SHA512f1e551af70492474d5a180d23a1fecb5be4809e8008e28c5554345a44b753c601d30fff65b97583e01c4d6743697aeedf772a63a516d940bd4fa22897d3fc5ce
-
Filesize
6KB
MD501a34565bb6479dc8a62316d2ce36d10
SHA100b98a3f178ef7232dc336bec3ded4932b2a09c8
SHA2561d49cf783fb4653e3c99c4dc3cff7dc680c96e6f82d08bd2f1f836850ec94431
SHA5128acb1db23dc03c84e38550862256c172219970163766a94fb597f38f7ba6606024e623298471494be2b7c2110ae520217ea9a4f50985a50732bad51562b8c10e
-
Filesize
6KB
MD5d9c52e51338c04146421768abb28a976
SHA172eed527697b60b605ad85944fc000a7ebd2461a
SHA2569c2a67529e46beb012fafba58b039b17b42102836ea30cd727179c2c3900b7e6
SHA512c65ee68ceb797db8ec999cc6687ce5b4614ca6c80cb68af32c75fa0212385f14d93be140f56d6562584967b80e6622a5025346efbf85fb09ed76d082969365fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5bdbf8d691fecc8dc54ef5b06a43a722d
SHA1f39f4eb83cb6b27965bb067d7d6c9e62df3aae5e
SHA256de9348ae7350b8734deecbe56d40bf5dbab71f7c44c872d3efb54c57b5e9f943
SHA512a150b0c74d6630f81ed877799ef25b681aa09c56b7cb8bf5fd31e7bd71d71d51a96e227224fcba9d4ce9debc21943a86d42d9612c8965b15aa1fb8c6e443c5d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d532.TMP
Filesize48B
MD5b098807ab44d043eea67df58cbcdc113
SHA19d030f4d1e4e4e53618fd5515807f306887941f4
SHA2560700cf43dfc5c91ed168116c215124c431c2503fe5593181f4ecc973fde2afae
SHA512a90f1843412a729c285d1d96fd30995e08acb9078998bd66ec1f2d4202db46dc44bb1b24be4db073e75fc278844d6553ac1a5140e5ae89d65e26efadc5b26413
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d84e28de39489025b9e7c59f94997ec2
SHA11cb452c58153c24ba439c93a302acdcf98b3aa7e
SHA2562b659e2cd5d4dc5e3d02ecb4168ff7becbadcb4613a20bc966492d9986653c46
SHA5122a9341c6925a7b48c6c682db9a7903df08f9bc3e31be61eb85a79de25261bc7c210aad62e371129c12568f381d64645a952d27b755be26eab9e626753d620cf5
-
Filesize
11KB
MD51cf675839081cdcbbacf52cc84d3e853
SHA18411a3b177dc8449480a14183db995c7c1c1d9ab
SHA25672e2fe09ff8e6ff3d46900537bde55e20d1cdb4e37e667d6dee42aab1b48ba7d
SHA51215c8b82459897d93a335bc72dba0dc8b93bd24604bdb1cc210f5faafa360a268870254f7f10fc70af0c4682626098ef76b1bf5221d8119d668499b1c43c10b67