Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Phantoms F...an.vbs
windows10-2004-x64
1Phantoms F...an.vbs
windows11-21h2-x64
1Phantoms F...All.js
windows10-2004-x64
3Phantoms F...All.js
windows11-21h2-x64
3Phantoms F...mps.js
windows10-2004-x64
3Phantoms F...mps.js
windows11-21h2-x64
3Phantoms F...veM.js
windows10-2004-x64
3Phantoms F...veM.js
windows11-21h2-x64
3Phantoms F...ces.js
windows10-2004-x64
3Phantoms F...ces.js
windows11-21h2-x64
3Phantoms F...ces.js
windows10-2004-x64
3Phantoms F...ces.js
windows11-21h2-x64
3Phantoms F...tra.js
windows10-2004-x64
3Phantoms F...tra.js
windows11-21h2-x64
3Phantoms F...ra.vbs
windows10-2004-x64
1Phantoms F...ra.vbs
windows11-21h2-x64
1Phantoms F...rm1.js
windows10-2004-x64
3Phantoms F...rm1.js
windows11-21h2-x64
3Phantoms F...m1.vbs
windows10-2004-x64
1Phantoms F...m1.vbs
windows11-21h2-x64
1Phantoms F...er.vbs
windows10-2004-x64
1Phantoms F...er.vbs
windows11-21h2-x64
1Phantoms F...es.vbs
windows10-2004-x64
1Phantoms F...es.vbs
windows11-21h2-x64
1Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Clean.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Clean.vbs
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanAll.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanAll.js
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanAllTemps.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanAllTemps.js
Resource
win11-20240508-en
Behavioral task
behavioral7
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanFiveM.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanFiveM.js
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanGameTraces.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanGameTraces.js
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanOtherTraces.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/CleanOtherTraces.js
Resource
win11-20240508-en
Behavioral task
behavioral13
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Extra.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Extra.js
Resource
win11-20240419-en
Behavioral task
behavioral15
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Extra.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Extra.vbs
Resource
win11-20240426-en
Behavioral task
behavioral17
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Form1.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Form1.js
Resource
win11-20240508-en
Behavioral task
behavioral19
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Form1.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Form1.vbs
Resource
win11-20240426-en
Behavioral task
behavioral21
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Properties/Resources.Designer.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Properties/Resources.Designer.vbs
Resource
win11-20240426-en
Behavioral task
behavioral23
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Properties/Resources.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
Phantoms Free Cleaner SOURCE/BetterCleaner/Properties/Resources.vbs
Resource
win11-20240508-en
General
-
Target
Phantoms Free Cleaner SOURCE/BetterCleaner/Clean.vbs
-
Size
15KB
-
MD5
8dfa0e21818ec815a8234405404cc8e0
-
SHA1
d7dee7fcb635183c6ec01bf03db1731dd6a0658d
-
SHA256
e35f4f3e39f20ba38a6b1db992368c91dbcca41268055372c0d411f834e8dfe1
-
SHA512
b0535c1b64a4671a492f8cea8c10d7f307f4fabf1c3515f0c40ccec5e4e773c20d2a5acd6e28c3efbb1832025b594f5892de3e86955b5fb4ab070340e057eb34
-
SSDEEP
384:+jpZLPRsLvASJ+aQPhFcI7KQDydV0nGBcPOhygwrvz9hq7QVwl:+j/FskSJUNo7Qil
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133622944483100858" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4156 4688 chrome.exe 97 PID 4688 wrote to memory of 4156 4688 chrome.exe 97 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 4452 4688 chrome.exe 98 PID 4688 wrote to memory of 1532 4688 chrome.exe 99 PID 4688 wrote to memory of 1532 4688 chrome.exe 99 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100 PID 4688 wrote to memory of 1092 4688 chrome.exe 100
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Phantoms Free Cleaner SOURCE\BetterCleaner\Clean.vbs"1⤵PID:1448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdadbcab58,0x7ffdadbcab68,0x7ffdadbcab782⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:22⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:12⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4548 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4636 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3968 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1984,i,11980420234021873231,14389618401338452350,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558af2f21006a1b948e96d546e0820af6
SHA1dbe5d1ed99d09b3aea165bd683df1b245850fc5d
SHA256e984a399a55127ead56a14f2f552996365a9c0909df5fd15372c58b71a09190a
SHA51229893298345d19c3ac43f4aa8aff958848ec8644eae41c7728be64f8ffc4231d526ec31595c0716d1dda0dd8a4aa4c56510b430721f375916b348ee62fc3dca8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD548d85af9d658b247d2d6f48d3d71d054
SHA13fa584919a07e7bc4bd94197e8c7cc5e69ee3ac9
SHA256f8de285ee4bff747839162adfe3b27a47193e038a8cf1d8e6d4d514a187a99b1
SHA5121735be081f58542c33492ddd69ce187bd95e03a2eb3a399424022ecdab0110c87b73a49dd59feacfd6e84a74fe65a6b3b81a55e671bd9b39539bf0637a3346a4
-
Filesize
7KB
MD5c3b2adb32ebeff80e406cb57fbd83a8a
SHA1d2fda8d00bea21932c106f31a36d621b8c914a7d
SHA25673b554fe94368ead82727057d8f9304ee7309eaff701de3f01ade4f56b29258b
SHA51263ce78d5274280f52a8fcd9e7b3c397a546336460725a8421c6084fc1d2f19af8f5f6140eb9f823d5a0fbf86746a3a434e2bcd7478e9327584805bc384b13ee6
-
Filesize
16KB
MD5f16caf28bb6f2975009fcbb4b69755c1
SHA134c8a64c0684bc2fc771643a4db193c4c8540f1d
SHA2562ab8585dce99068c9eb9fb202f0e82defa02bd26dfe33a139f824765d7ea194e
SHA5127b2ebd25e525d4d590664bbb57a1fa0746f734b6c7a88a976161694c09c78637c205f698078fd22e5bad4252684cce853e86f34a56a79c4c135d14b42eb4b21a
-
Filesize
301KB
MD5b98822b9bd4d08dcc6932330e6f040a9
SHA1e18f40e5f3d3b9e01e4177354df872e35bb527a6
SHA25653b6fec5c79d5929a1b26ec685f2fab7aa24526f5621ec6bef24034be520f789
SHA512ab46c2a54ed91d66b7b0c763cce538b6ac3c74a4e9b385a408de53c3d5b4ffd6b1771c4778915a1200784ffeb27b106309b61d48b3ffcf906cc40061c4428a9e
-
Filesize
265KB
MD52fd5dc7257a8871c4763d9197f1dcd1e
SHA1e57395cddfd384860a78e69bf376316f4bd1c618
SHA256c50fdc56abe65bad6ae40d13f85f2b3d91ed18203885ea73882319e977f6844e
SHA5121bc9397eaa0f82fd4e61dede1e42a10960ae109f36c49421e9676909432c957ee77e6a5504ffa82539532ebf2d38a67f1996332be7d0e8b3d9412d0d9e83664d
-
Filesize
257KB
MD517f5709769a4a0868aec5587e9226b83
SHA1a4c2a5cee06209e6090b88308b3f095358eeca9a
SHA2569c292c864c73802b69799070a237600b58fd66efcc4a1e4de72006f4f28f0832
SHA512b67017b68d31e503ead46581be806fa7618d807f8c75b4d6ef264a6b4ae3ccbe94ecd4aef56b667c173a482462e9e463a8b9abf5477950e10d5c8b3d35b5a205
-
Filesize
265KB
MD5ccf39e12c39b5ea37ea94d1d499a83ac
SHA1a75d160ae7d7d10c574a8133bc1b9e5ee0df27bc
SHA256be0f4530e0c1a0d21e1613b951c601b9d902e2b40a6ecd9af3c1ef929b7fe5df
SHA512504045463d701bcbb6ee8c629fc38d45ec342d47b3112b3321b8005336eefb299b73fd003375d514e722ff6d4660336dcdd7e08d19480960ae698dc51d28b390
-
Filesize
92KB
MD5d7edcf4d5658a1fab15c205107f56f9c
SHA1384b33fbd1b76f4e61de9385649177cb82ffe08b
SHA25648ba1666429dff1f983e48d6d4b31aa106dfaff541d38acc0d18012b41a42922
SHA512ed59e4944ce8749185ccd732056736f5fc865ff1de83e4140cf3df47bb1fa81c9e5d1a051f822c7b126fd3a9973304517f03fc4abcd3226365785bdae7643f14
-
Filesize
89KB
MD5499f7f3a4fd7ff430d44ed6ed6f6f34c
SHA1c78a981aae4ad234267e680d89bba89100503870
SHA256eaa8376b19560400bfc82fdde536d1291b50d3867d7d775a309579e9dbf6b581
SHA512ea0889b18156050284aefce4001ccdfc1a9feb177fa22143b10ccef8140cb8ec8c4039b85835a765dc4c0dcb4650197caa71181ed1f8b5ed6d5a3d8e75d40752