Analysis
-
max time kernel
960s -
max time network
965s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 18:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://celeryx.lol/
Resource
win10v2004-20240412-en
General
-
Target
https://celeryx.lol/
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3084 winrar-x64-700.exe 396 winrar-x64-700.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1132431369-515282257-1998160155-1000\{2E931746-9F61-404D-8CE4-36B1AAD73F0F} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 985568.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 2696 msedge.exe 2696 msedge.exe 2660 identity_helper.exe 2660 identity_helper.exe 5528 msedge.exe 5528 msedge.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5888 msedge.exe 4548 msedge.exe 4548 msedge.exe 5144 msedge.exe 5144 msedge.exe 5144 msedge.exe 5144 msedge.exe 3876 chrome.exe 3876 chrome.exe 5276 msedge.exe 5276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 30 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 5556 taskmgr.exe Token: SeSystemProfilePrivilege 5556 taskmgr.exe Token: SeCreateGlobalPrivilege 5556 taskmgr.exe Token: 33 5556 taskmgr.exe Token: SeIncBasePriorityPrivilege 5556 taskmgr.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe 5556 taskmgr.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 5268 OpenWith.exe 3084 winrar-x64-700.exe 3084 winrar-x64-700.exe 3084 winrar-x64-700.exe 396 winrar-x64-700.exe 396 winrar-x64-700.exe 396 winrar-x64-700.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4764 2696 msedge.exe 85 PID 2696 wrote to memory of 4764 2696 msedge.exe 85 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 2852 2696 msedge.exe 86 PID 2696 wrote to memory of 3008 2696 msedge.exe 87 PID 2696 wrote to memory of 3008 2696 msedge.exe 87 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88 PID 2696 wrote to memory of 2024 2696 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://celeryx.lol/1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2f1546f8,0x7ffb2f154708,0x7ffb2f1547182⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6640 /prefetch:12⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6568 /prefetch:12⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:12⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:12⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6528 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1260 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8076 /prefetch:12⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7952 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8128 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7748 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7548 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2192,13365163378868960277,10490548069086684927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Users\Admin\Downloads\winrar-x64-700.exe"C:\Users\Admin\Downloads\winrar-x64-700.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3084
-
-
C:\Users\Admin\Downloads\winrar-x64-700.exe"C:\Users\Admin\Downloads\winrar-x64-700.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:620
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:216
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb1d95ab58,0x7ffb1d95ab68,0x7ffb1d95ab782⤵PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:22⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:82⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2284 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:12⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3540 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4436 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1984,i,15772711270442142322,1542783363447192342,131072 /prefetch:82⤵PID:5724
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4856
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\267ff185c32940eb89876ca5a934882f /t 4528 /p 3961⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\87c815a3-db65-4aa1-bedb-c494a9477362.tmp
Filesize1KB
MD54118338763e22dbc25a39a3e976358db
SHA1f12808d3f88fed6c29e1cd67933d07ad1bd629d0
SHA256b615ad3831fffe18c4793882be114412f0c076281e268d47c6103fa5115bcb32
SHA5123816050371a5f99493bf327b303d2ca1e534fd1777df26cb36580b0f5cb04dc60d8b1110cc422a6c8c8b3142c8fdcb3ee59cc6d400d3987092b7cce171347f3e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5e4327fe2aa4fd32b4133d9a1993f2f91
SHA1e720f15e756d0d63eb3dd47550307a571b8cd4f8
SHA2560a9f3ea5f66b638061db17f9ac6437c2b0741950f1b3a222ef9cd751ed6a2b93
SHA512ed1e4b1126042e66ff0a58694547f6ced1f006463b3140a41e06330271ba7ba03bf95fa5f8a173e58845adc0c46649a07b28d59907b244589fc4f2aabc9148c1
-
Filesize
6KB
MD55ddcf108093b92d7b0f517853a0cc3c6
SHA1913c3683d1f678d93f1d94ee699e13cf595ddecb
SHA256d322122a0e6f37412147046d7a8fe60d5161d808d744e91efe1a435fb521d442
SHA512f48f363a162098b7093175e50b0025e9448bf58da1292e271a5a07747a14476be78ccd69e30b28c2493870b328d93505658debd7f616082a058d4cc56a60c97e
-
Filesize
250KB
MD502768727b5891149fed2abb76fa18290
SHA1f150a01c2b6f54d13f19a0609d6dffec5ff9576c
SHA256ecec50a7c6a2935d4c68a5b969bfdbacf08ee7abe4f649b6c37f83520a739e90
SHA51241fd2a184886576d858b3a8ca83db19378a0e10015fac9fb58550cec68c745365c438e906e4d4cec477f3595703b2ecdaefa431b08bccfc00cfc67c63372a038
-
Filesize
250KB
MD589eca7a1b6347ce139f2885b95f639f7
SHA1b409daaff2efff63112e23f63328def04ffb026d
SHA256d8d0dc283ca4c43e994b3f151c900b34caf462e118ec3576ec04dd7dc349a3ba
SHA512de6e6a9baa4e059b405314530d15ac842ba5e98018403d10b87a9d3b7f6083f479bf193c9508850ba94c9d832f596f113657b435b4960b3be58e608980a5ff16
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5d475658ccfaa7b44c6c1f945f2eb78ec
SHA1939927a93a9da56509b7376d7867ca2aede8ec0f
SHA256461851e9f09a5a16edc8a9e8389e2a6d6817126b0dd15688b9852a07e7c92712
SHA51284961f62bd296782439c2b3f06bf617af4eb3ed51ef85c1d0c5cc02ca3fdabcd932ca146ebcd9dabcac6e963a5f6a2f49cb924e7f9f971fdde725e57770a2d3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5713965afd995f86d639d60b37f47ccea
SHA17cf3ca0a3df416c7bb4871eb6d8f11d1134b8a01
SHA25665d4a40ef693e9d7cb4d718d0b1eacc029596b552fbcef2210735d7d18bf71ea
SHA51237274f6a7736dcad5d3785f4f9fe677574c5937ed026acf0816224b91d1a2e381fd985d48ad2b5341677b87e958ac4bdc31f76e5fb025fb406e7e6baf61bfae0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5fd4e60dfb78aa4b6f08ffdce764fa804
SHA11979e0999da301a8c3c3f0c33317188e55c0a4dd
SHA256531ea26637c91a4321bf7198daf3430db9d0d7356f6d0af0baa41c246e6631d7
SHA512490c6d284e7707183cce6351cd2752a2f45089e8e473135c5d786bc34b28f75b97f0d1293625c7e316ddeaa93365c9816efba94ce6430cd22c8c5fdfb1bf1e81
-
Filesize
4KB
MD5d3f0b5860b23a8a3f7260a15e7ea6cc6
SHA15580534ea3e5d37a2480ed719a6acc372812b077
SHA25652f6a5a3833838606b7f0c8653a3937f23fb79594aa8af1d2815b385a7617825
SHA51293e4e3c60bf1518a73de88b3d86c661710230eb0606c089a29c5e9c96f7822be84b4f665ada2db0571ba6920f067a628dd7e3bbb27050ff04a182baf2e9473dc
-
Filesize
3KB
MD50788ad31b05c106c27d10555554aab5f
SHA137ff1801a68a608af9f00c95f970e25246480651
SHA256dd5a206b1872f8c33b0db4f469f07a4599565f6d010e80d4a4b775b882b2456c
SHA512b36085e480b39c2e55ec64f4016e7874760f9435611d08c870bee9fff6959ab37f9d2460bd741d6a7c0c7e1e2564de00f1d902e0f99d2305e2dfc542699b0846
-
Filesize
3KB
MD5e7c1e856a826a9ca8ab412317ab0f2e6
SHA1d2f08776838152f236ce3f3f27a219304b13e8eb
SHA25663e3fd27b1325ca03d42df868aed50bbf0f9060b6b64657da661f5bbd63908e0
SHA5127c4a20e96c159fcaa4e27bb9b06f5885dc1e11f578520a39255c7d6a68555cf82e999bf6db8520a884989f32535329eef040000da488840e06d301485ee23581
-
Filesize
8KB
MD5b524478ee8188b11e9bacd0f4611dc4f
SHA13eb4d430914c0210d54ec9b192f2b020b2e51ca1
SHA256ea8ef631a4a7be49af372ddc94b02d266530140bbb180c7b66430f2b901b8199
SHA512e4bb0c937dab8cfb7ea7f8c9694753a3cb39c9f767a4da46ec287cb38adeb9597a3ea31839a63c23552c12abd9b2b6d312b1fc3a19491de33ed2249290636bc7
-
Filesize
8KB
MD5c5340f3214cc733f427b96d9fb69fc2c
SHA1267af078b50d3bacce0db8a071bb2da15b87dadc
SHA2560f3f3a59a4fb1dbb8f35b0211f96606c0ca4b2db876dc59dcc08680509a8bbe2
SHA51275cf8851ca367f753e188b94b52c0408d347b3780dab73c21f5c5500f22c2be486ff676e3cbc7c40a6d3f68c6c614a7572a82f0e1ec3a36e0e4dc9a7bb4d29c8
-
Filesize
8KB
MD5deb7dc76740c07e072bb74ef352e7983
SHA15ea52c0b996f914161a76fffd6d3018d845cf677
SHA2567e282609b3d2af8739ce15b06042d56a6d27b9651d786c9344826e679ec0c404
SHA512e85a6ce1ce02de8f4e9f938808a73d3f67803a140d1c93e3472f0c41345d554a2e03633ae13504a110fb493bceaad8a18925c125cf988bec8e1f1f0abd1d0112
-
Filesize
7KB
MD5bacf388f2b67b50951a620cf3e5a30f9
SHA184a4d1e7c7f7092c43c9dde1c14a187609c8a2be
SHA2565472d6430628fde2e07db2a61124830ffde318e841e4c9d3cdc969ab70f526fa
SHA512060123861513a3d28f53573461ba886a7ece09179ec7ab2e6a219de4f9f57d0edf917cdb2a4b39d695f5a996795a5301adc907b36f9feb8e0de2f5b3e5ccd561
-
Filesize
7KB
MD58f135719692121671c2634693147afe0
SHA13affb5cb76541d6b0b74739b0c2e76eabe5451cb
SHA256d0fdebc4f63032b0144159b952d9d1d83abfde241239dff4e8343a4399f486b1
SHA5122ff5469a9680272e376e7c5cc021189f617c328a37f75be9edf089ee77b1b061b36cf378a03631ae110c745ec860888f289bd69f5252e800315b22da12501171
-
Filesize
8KB
MD55f25f853118b1fc53a8b85ff6ffb002c
SHA1ebab8d32fa3700cb8248b95a92a45bbf76a7e4e0
SHA256a9b4425efe3b873da83b17cdea22840b1838d7a3d055902e3adc49ae24dc4c3e
SHA512954ecae95341ad2d167513952e4ed475d4eb53f53937c2db844392a877ae7dc0b29c17226edf02a798ace25630e576ec6592e0e90e156d4a78fbcd99ef6c1771
-
Filesize
8KB
MD55a2e983e5d0246839be06b8f5fae31bd
SHA1be5c36cff1b14bf1ea3f58f8336f324d9de2a018
SHA256ad0beda8124f9a6a6dc85733c8dd0000d45375c776fd87985e96a7e296934df3
SHA5121c1edb7ca8f167bab4f718026f994ebf1ce232e063abfe7c1600749701ab89ee629bc2ba42570c4cac40c782ed3cbd7b8261c4932ed31087a4c37d253079228b
-
Filesize
6KB
MD5b182072cac0f98ad569aa9606a35baef
SHA1eceac60b26d06a0b9faecd03c0b1f916273bbcfa
SHA256d67c1d411e82cb951492fb2c022a875630c6060e4943099255f6ba926299a3eb
SHA512804521228f30ec57b3de23a38eb254153133d7659da659d23693f05ee9153b363da928f1626ae2661f5ccbe2c9e97c7083e0cab4dba1d9e3cd1cd403e90b9950
-
Filesize
8KB
MD50577f60a6b2e0d1950d19c0cbe307109
SHA1dcd5f8b66f2b3b64cb95ff01e6ccb48597fec655
SHA25632eaf77cf07655805b2f40cf8808d133f541cfe0e2c1027debd39feb119840e5
SHA5121c6b34abf1499149740bfb174cfe54586d1229d1e5f6f16ca995a399d27cc4e919873bf5130ee1e12dd09e3eb2b8f5e6443c02c2476fd649e60bbfcd0d9964f6
-
Filesize
2KB
MD55c836f53c56648b5c3b2010e637f0764
SHA169d36b2ccb8cad5bd4695efeae1bd9dd3cc648c6
SHA256feadc19cfcc2e70597f35330293e20853388679a279333e0a1a5b10ad0975550
SHA5122bdebed91ec06bfb7f8550d23530c486f399c61ae6b6e5c1e1eca2db4b49ae31fb2b36d76cc52263cf0811fa086aea65dceedfd45d65fbd274d634b98b95a9ce
-
Filesize
2KB
MD55af64e4031e7a62c86251f4ca6d8b191
SHA1855a3643e198c7cf84be2d71b43af6fdd33970dc
SHA25611bb2c57ddf983c24d3524dcf7ff1a7c4ba831c1d5cba2611ed047ed27d90c14
SHA512f5ab34450d918c444b4883e4b11867bf2e42610937616f2994db04d2b40cbbbe7f1ffc90e4ae1cf58dccb894c5631eb0bce09bc294cbb9ff670b7a41fcd78154
-
Filesize
2KB
MD5e60f8d96456d1afa761eed4a0465b024
SHA1443d14871f3e7d3a9ac2bb13042691844322bfc2
SHA256dba40cb01b08de076ec0918f12392c0cd631eac9be7a5d579b17aa554f37873d
SHA512e56eb66c4ab3b753328b48445288982bfa38e8c0f3a8765dc6ff7e035fa7286f8d3ce73f17d828c91e63d296525232908edb4533e0898c8880f7fbdcd118db68
-
Filesize
3KB
MD5afb553902a19e11cab88a61294a692bd
SHA16e87ae6c10dd4da41e19ecd077310030abad5ed8
SHA2560d88dd855e315fd031f6f0efdc4a68a650c25f57751cefde34e7237ca39ceed7
SHA512244ba47d3be1898b8e9c73b3f013348a2bce45cca60f452275cffb2299cd92b66dafe4e647c502c8f081a573112d3c280d7ae984cebc6f9867a43e711c12b019
-
Filesize
2KB
MD5a4c9ee6249a7b24d8b3da4e3336c14ee
SHA19030997133205318361100d2f264e068de7798d2
SHA256735ffd36155c41670bdb897e652fa64949236f9dd0df32a67e492527a80cc3e1
SHA5122b0378b4a0e9d0910c7a8d6bcf1db218b365dc3ddf709b0bdcb512762e51df79c8024b883535991fbfed0e0513c3e016298a1e9db46635cee104c5717d170a66
-
Filesize
2KB
MD57f168f9f8b1ae335067fcdd2ccdacfad
SHA127c9fd6ef4b931f862de195531c91c453f7e559f
SHA25615a15bd24c542863436855805d745e10e95d3057ffca82938d88de4cf51c011c
SHA5124de80706b44ecccb0b0dd9d3b31c53d722717e9c69aa7136c0a89918733c1bd27bb54b8a49ca811a550cbe93e2ed3c33aa5927970d30578b87ca978425d2341a
-
Filesize
2KB
MD53354a1f48d0b161c1c79b68d3b5e49af
SHA1dbadf90aeae4e84fb8b5be22b6493e65c65b0f69
SHA25685681a0f014c8eb50f9b863107548cb84b89f5ff66363ad6e5b10c003a312bcf
SHA5122263eeb51439fb3b864bee5e4b53b47be660ff91703548ebb1d68c5f461e60438d624590264947fa2bcffe0e8b9da699682ba36fc274177b1ad22c9a1ab4ac00
-
Filesize
2KB
MD54750332dcfa1d92f4f0de2b4a77923e8
SHA1e58a48aa22561b5fa5fbcdb46a0b96b8eee05457
SHA256d09d2d1f98bce62ff63a1b22ac3b0ae499646d9d078eade7e24c9af64cc2adc4
SHA5126fe929f0faf0a103d715af8f9531887fe6c822228772ecaecb328c79614d803fbd7e3e6afe325f2ebb82841d03db7c3535238a438a9c97f29c3af4096de824f3
-
Filesize
2KB
MD50b1020ae572e960cba07c48ac2dfaa39
SHA1d7417883eea2d0bd53533c48f0c15220ca0d57de
SHA2566084441de39d885e8177274a06408549f655a7743789f1a860d27b86b48232df
SHA5124a913dbf5093fe67fcfa7072cad753870eac04f711f1bc270f19968c0d98902329528c384d401c19af7ea3ea6a5cc1c8f4f67ba047442c7f6131495b8c18201c
-
Filesize
1KB
MD5f65622629c87d59dfe49f16982b7ac9b
SHA14a04dde5f3129d226c8a6fd8546e630e33570065
SHA25697c58ffadb79d0ccd4af8fdb8869dc78f09f6b3c4b94329173fd74426f019389
SHA5121b0bfc56e1b9cb013900eecceb0f8ceeafdb94931d799805eb8f2d78d71992489703b767844b3e2e92a5d9980cdc41e2067f2546a6e30b8d2a2607847331aabc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cb47658fc5acc35e17adc199e8f6cb82
SHA17b897f935430cfcdb5ae58b7fd556737c1a316de
SHA2565d0c977ca12a9630a0f6da36a0ac098585525a81b04724ff89658a82bf2bf4a8
SHA512261fa851212fb863424f229580e976a2d9b291f4488b0e5a044c8558b23aecdf59372b904b31351ad4f816765948fcbd9992d81cad620ce2d1ffc7f5976f060d
-
Filesize
11KB
MD58ce79bad5e608b15ab49d9d13fb67918
SHA17339269dd1653c31e9e177ba56fd9eeb90b7eae6
SHA256525f7c55316f54b6d872f5b024b6e2c57d25514e589310d56e51b2b30702cc96
SHA5127c74c140d0b586cfa7f0ca6f6bb29427c513ca99559c2f93c0ad2b76229eab48c722d54d6844d0b9f4cb2e0f9099554e91cc87f1621d730c9bba3f69ebf46009
-
Filesize
12KB
MD58352a5b16d3f6b5df14adc84077405c2
SHA15a0ef5be2edfb26287db9a10962216b7edcc1cca
SHA2564e15b7f6b9915796ce1dcc81a5ecbcc63ce38dd0f191127bacf24af543fd75a6
SHA512433d65bebcd077c15b368811744889700e93bbce3e12d2bbf6a1d1b9abd4970a739990c6109779d39dd121aad12c9a02175404e4848d7d60c4b1a49b643d7c89
-
Filesize
12KB
MD54f57025b5a80913647678a3e54ef5c80
SHA11695fe8110f2a3977d54e1bbfb964809ebc8016d
SHA2568181f5aa4644dc572e851214e87a04468d15d6305fa4ed9dabc9b90497e5b540
SHA5125efc4621dd7de93ad5502b40f52cbf031c62c52229a80f54c9a1707d3a3db8288fb50b281d188d3ffa0cdc387476b2a059b167f0bbb358cb36e8f191a415e42f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
10.1MB
MD5ba995457ee510b4f55560ba556bbeada
SHA1312c7468de643b8e146c5ed02867dffcd6bb7f37
SHA256e73b3c939cf1dc3054fb57ec128cb139d369a46f042f7e5129eab36f1bfba109
SHA5125cad0bc98467b63388dcf875d0a7ada5b592c6d95755be6d5fec9b002b6f75dda6d4e9e6e60149629271a980c2fa2a60d7fdc457e2139bf109cc56a08c49c0a7
-
Filesize
3.7MB
MD5fc7776eec30751e169e1089bc2a4c478
SHA199cdb78719ca97c7351aa75f1566224396d9033b
SHA256426b7b38ca6de20f1f6535d2fa63c16e11780c7cd5f2ebc66ff9a0022e246e83
SHA512bc94f526d4dd751a44071dd6f540f2957d96f5c6500d7e5bb41ec6581bb0a584a6bb91fe13f7a1d9c7749c4601b1fe95f2a12a204b73bdc9a37c83cff7ac35c3