Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
BeamNG.drive.exe
Resource
win10v2004-20240426-en
General
-
Target
BeamNG.drive.exe
-
Size
4.3MB
-
MD5
5f254da7eb091f36c79f3a599b79fbf7
-
SHA1
43766fb599e7e37e08d406b8fa917c4db6d11a89
-
SHA256
123a0759cf5357565a8e92e6affccc9a8949b1ee8906f0887b437dd1aa9f0d79
-
SHA512
0e44dc94d6da029883a4ba93285bac0933fc45f37545359481bcf6f613eccc6d6cf1bd510238caa94a2f5f7fb0944ee4a21f8842bc18a061ba82ececc827999a
-
SSDEEP
49152:bELycXMzrIMhLRfagsTnKeGyJWzcwL8Z2HGQz3lVvQM76rjPtTyZLNGLOUe1:bELZjcf1e1JWosfGQzVSM76r5uJ
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\shell\open\command BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\shell BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\BeamNG.drive.exe\" -command \"%1\"" BeamNG.drive.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-540404634-651139247-2967210625-1000\{C997211B-6C02-438E-9227-2FDCF0DA0349} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-540404634-651139247-2967210625-1000\{AAE059CF-EFAE-4809-BA30-4BB589B94988} svchost.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\ = "URL:beamng Protocol" BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\URL Protocol BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\DefaultIcon BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BeamNG.drive.exe,0" BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\beamng\shell\open BeamNG.drive.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3380 msedge.exe 3380 msedge.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1004 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1004 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3380 4416 BeamNG.drive.exe 96 PID 4416 wrote to memory of 3380 4416 BeamNG.drive.exe 96 PID 3380 wrote to memory of 4140 3380 msedge.exe 97 PID 3380 wrote to memory of 4140 3380 msedge.exe 97 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 1428 3380 msedge.exe 98 PID 3380 wrote to memory of 3928 3380 msedge.exe 99 PID 3380 wrote to memory of 3928 3380 msedge.exe 99 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100 PID 3380 wrote to memory of 4760 3380 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\BeamNG.drive.exe"C:\Users\Admin\AppData\Local\Temp\BeamNG.drive.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.beamng.com/UnableToStart/ExeNotFound2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffa0946f8,0x7ffffa094708,0x7ffffa0947183⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,16305783151026674626,1393920467293831437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:23⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,16305783151026674626,1393920467293831437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,16305783151026674626,1393920467293831437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:83⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16305783151026674626,1393920467293831437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16305783151026674626,1393920467293831437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:3616
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:4396
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x120,0x124,0x128,0xf8,0x12c,0x7fffee9fab58,0x7fffee9fab68,0x7fffee9fab782⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:22⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2284 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:12⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:12⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3532 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:12⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4444 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4580 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4736 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3888 --field-trial-handle=1980,i,15387660778167262979,16896317581501688015,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc6929b1dd73395ec459e8ee71882792
SHA1f7c88711fb375779116afebb2b41cde511fed113
SHA2560ff48a05c790b56236dbe4067da4f11a58cac019db3e9b30b6206235fdc12060
SHA5126ea3e7a8e6e6256ea5fccd16d7b1a54341cbf76357e34c5b3ad21ee5e6d72f28d97d2170ea579eea30fd5a8b566005f79c0e9bf41f03b3af22d92c13c4012e32
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5b9fd848d2d9f464af8a44bc183c7e625
SHA1e3c85f5f67c33839557a3e87935e003daa3b6315
SHA2561226aab246748a6f5783fff3c386afcbfec5fca0e5d628d654c0f7ca2b488dba
SHA5127b649ffb281c43ae7bcc6e0ea30fc1fc67ff0384f48d2e8d941c0f6fe8f9ac8ec77ffce6c555a41649cf8efce1f0de1b623098bac61765e6a031f22e9f98c13c
-
Filesize
6KB
MD543e996f0f47263970ebba7816e2768ef
SHA146c5a95fda927acebb1639c700c73fffd6db3f7c
SHA256ac671510fbb3e539ffab73e022d2661d318440e26b35712dd7faac58c9977fb9
SHA51218e36dc940a7623d0c27e3d8dafe953ef7306836acad42be506e29bb743bc60d6442183ae91c4761b05a2543bcaf88b6959bd6edde5de66bfa3713c5c34ef4e7
-
Filesize
130KB
MD53705ecb774aa1ea19e9480f5c1f85ff4
SHA1eceb5dfcd4363f49a953554c3909fdf9542972fc
SHA256cc39c6d703489dd61fb329c0b2120bbf0ecc371913ac20ca6dbfec13b2954fc7
SHA5125a2ba483ea15e35b11389905e92e0291341c7f1712db6647a094e51176f3906c073db995e325b63e6bb2109a3c0cb8dcc134a69ab5115c137388cb2eec2e5977
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD599d31c9e4d865cf691f5b982699d2417
SHA1dd3a229676f8ac95662fdfe4a5fc191a13b00a13
SHA256d2c8dfa7a62833ea1fb04611337986757111b999eefa913cb3f0fdc58e6ab442
SHA5121fd0b8110ff8156d156938653145bce851cdd317e1259f6379fc31565f2ef9b0b5cc107c32ab18a3709db0b05b718a9bd8dab9748e181a59bd80478672bcec78
-
Filesize
184B
MD54e4123ae32f58b796225dee5f4cf7213
SHA1b612827e4bc6e7554989ca203f5674a3886fcbba
SHA256f6b08dcc962dad1a56520924b44f849d1ca465f2e5621b3aefbd53b20fe9cca5
SHA51292a2975bba39e80eecd9c193dec5c7f4e65b3ebc3a598e180b3aa6dfe92e115a9c713decf35587d8f4eb447e6c9dbce39d792df502edbacc5576b9ffe070e65d
-
Filesize
6KB
MD5cbf7ae6aa63aa9edc7bd02fabaf1b25b
SHA1b65b408e804b54545fd7871d7eef4ca614d95421
SHA2569cfc3ab039f92ce10f9e5ea33088213f379330ac17b4bea9f7cebb606362b51d
SHA512731f2dd20033c936b64c64b28ec2451bdf51b144c92ee8b2d60bfab4906722f9e5005a8e39c81520ff0a6c8245f916a1c397bea7bde9c27ea54b72261b9412ce
-
Filesize
5KB
MD5bd2e133801861a1d5dd5310d37e0afb3
SHA1268191c6d0c9b6ef780265c2180ef7037ce07705
SHA256367eeaf82121e6cc0f51e856020b9aca63626617f06d7a34a2270b20cf7bebc6
SHA5122dfc130604c47ab6fae1579846f1e3527aa277093fd9edd6be3538a392936c6ca9f564c75d3a37fe3934918e72057dfadc281984953c233b10e20d76a40a4ef8
-
Filesize
11KB
MD5a75896c8df2a23263d488c5f465939f6
SHA1253477b3c56303f9bc9eb57289145409a9ac488a
SHA25658cc8da0a674aa7f2148a7e03a7982e6c27a4623f9c3db8d24cba650a6a125a4
SHA5122cde133fe37646de62f84533c5a018e5090a5659cb97e56942fc8b554bbe354aad618634237618cb48e30c2f1017f036ca88c2f4b81a56fc592a60147ffce931
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c