Analysis
-
max time kernel
92s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 14:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ualberta.ca
Resource
win10v2004-20240704-en
General
-
Target
https://ualberta.ca
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649216915840092" chrome.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 5052 chrome.exe 5052 chrome.exe 5140 identity_helper.exe 5140 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1784 2320 msedge.exe 82 PID 2320 wrote to memory of 1784 2320 msedge.exe 82 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 2008 2320 msedge.exe 86 PID 2320 wrote to memory of 3392 2320 msedge.exe 87 PID 2320 wrote to memory of 3392 2320 msedge.exe 87 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88 PID 2320 wrote to memory of 1868 2320 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ualberta.ca1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff39dd46f8,0x7fff39dd4708,0x7fff39dd47182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:82⤵PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10651835528127305862,6000695138150184153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff28f5ab58,0x7fff28f5ab68,0x7fff28f5ab782⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:22⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:82⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 --field-trial-handle=1876,i,17561861142311405393,6905455910194433419,131072 /prefetch:82⤵PID:5216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d31a0ce228a7e261eaea58068093e53f
SHA13c5f31a321d524536bcaf15de0a3335df70aeeeb
SHA256669df40764b05563270c0ae67045ccc450d3a3429d9c0d2f5c9ae59c61c4735e
SHA512835bb767d512b3dee1c2f6a38b4e8aaf85a31bb441c427ccd76d3cbe38582e121fee3fae018cedec3d2140f807521ffbcbbd28309c6bfbab629bd2796e421445
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD54a1263c5bac859d5cd45846f49044acb
SHA1a48f706c5ef5e2a132eba51d48ce998285843d62
SHA2569110135827632520eb81c505ac45374e04e122f03388377604b44b6542ceef2c
SHA512f0747ed660711f417bbd638daf38f6a32a4847ae5a35a0cb551a62924bf16929658c62d91cce97cdda38524028792af42d4752b2981fe24387497df014491669
-
Filesize
6KB
MD5307a69afd5ec1d3e39687afe96b56126
SHA1a97b97b2bea2e2ace0d513816f3e4f24904e8276
SHA256294345d7de186e64e5fb8073389e646a5237e236c6c12da97d6b416b01f0b81d
SHA5121fa14b0a2cb067877d883c328fc124a5f6a6908666dc3baf0c1e758df0d80580e46e9c7d82ab00edf4ceb4901d0646fd76e4b5d770b4e716f67a1f612ff58873
-
Filesize
16KB
MD50be8229f6cf6857ac07cb371711d8f20
SHA15521045b5e46d8f505ad3e81ab63972441846d76
SHA2566c64103df09b42d7c5d9490370f336d1e0d38fa8e85b65866106b7d5664ef676
SHA512a1fe31313d3cef5bae96c300a23a2f949826c506715c0ec662751571bf683713ee9aa31fd450a62410ec9ac5607623bc4a476c3db853a00bbdc00b5b7a79da62
-
Filesize
144KB
MD5368d75230cecbe2e1eb98de2dfd9abd9
SHA1d42dd4aa3824413c66057cdc492bf32d4107d1bc
SHA256aa6520e360106ad73743db0ba2dfa02928ebb049f6e4eb6b01beac4667748921
SHA512605d35b84fae12696088dc55b9065222dae8a59b407ec5b803e227a91feca19ff9cb8314972ddaa51e0e1037b391ad779070925bbd85a26d0629cd3421d42471
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
285KB
MD5b32ae1c3c3cf9e1fe8037a85341b6d02
SHA1f047eeca485aa94c5bd75b14bc8b61a3d6e1d86d
SHA25633f9f5e866643a4b1faa5fc8a0dd3c5ed714ac688c8793261faf6a637dbac7dd
SHA512c0629c534e44a37e0adabf2cab046e97acaccf57d7685cf39fdddfc453a0f1ed3c3f3d998ff21788db7beeb7380c62cb09daea5ac6ec6c9e3d6b03d16eb2bcc9
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD58764100e4d883fe559e963ff230e774b
SHA1c7538cff7216e81b81cd316ae80f0173e8a3699b
SHA256b3200b7bbf4f839e6b8694124ea45c61ef9e21a3c47dae05f1dda29af6ec095d
SHA5128e731925bb12f552277a8bd9a7bd2a10e8cdb982dd02ebdae561c4cacbdafe84f30db0a97c51ad64c44a216f6a441ec4e0192da0b1a41d4895a16b5f22f7f5a7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
4KB
MD5d209182a0fffffdc571473e019fcb3be
SHA1b71dcc4a0a72cc6049ee660dd2161adb628097ce
SHA256f475d741bdc3f9fdd96f12daa76f8af59629c67305aa99d6d7901f3c8e1e7045
SHA512bc15725d8a14dc2bbeea3bd479a900679beb1526474934c722b2e37ec1d24b400b37b37eeb032e58fb3c790688e47cfbe63d9375548ae23e132a3375c3c13412
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD51a3f6497e72b48f8638824ce30a54ff0
SHA1ff6485c95dc8f83224d715e0a07a07edb40322b4
SHA2565569fd954ff215e66914003e2e7042afca67a1d460587a48fe3a3f15fa76f26d
SHA512649f5e4b1cda2d236ac5259965757df7427a2c84ad40a10f6d14ae43cc6738475ebec72b2808553b16150ef4873ad4dea939e99ed10573aca722371990ad8f52
-
Filesize
6KB
MD503476545cf8794cb898bce2707abd77f
SHA134aaff1c8632ddb5b5b626d33fdb4f1f0bf4efd2
SHA256af6ce75f1356ed5afbccb03db612a9110e970ddd4c149313d034eebf86fc2f72
SHA512d86860ec3c3ee47d3595964e846cdfa83662c0748b0e8a2283e6670eed3e871a88dccd13af2174be798589a650ad304c51278141337aa8f4bb24890c21ee92ed
-
Filesize
8KB
MD585dd37a1b9ce89e43152f92e4e65a951
SHA157b857397c199f1129e0693fd488d82f4cec04bf
SHA25695982abce9da9d59cd6e787234d58fb0973659a7955e7d55ff86fff42ddd865d
SHA5121ee83750d0a243c2e59ed601d63d80d59333e0e46a4afb00bbbca03bf71bd2b134693fc694d1ea435ef1cb44061b1240096937e8a27277a44e0cc6ce8e6e908c
-
Filesize
8KB
MD5a2c7b01a7437833bac1f6a47f76a5d3d
SHA1956a40a8c5c25217daae6ad7fc226d2e27e5f19b
SHA256d35fc923c28bac91ad61fc27ef394cb82caa1dbcb0665817eb598cabe8836f63
SHA512d9bb69897d08f70e5796527191a319d3025a0da73d6a102b2ce492a11695cc636b2e3790ef826062a618bb6f9e16961954672b93399fa5c144fde0ad23f6ffda
-
Filesize
1KB
MD576189d3d6ccca1eb80f838ab4629701e
SHA19856aec2f0ad3a38879ad859198864819ddb5d39
SHA256c1eae9f7348fa554154c117b50617e7953423041649fa3933ec53362f33e08bd
SHA51258a29d7e9c2f610211096e422b64f1bedf47f9d0064b12c97a6291e6d52e4fb39daad00f0dca5957f5087a198d8b57ef1e2d7b20cbbe910c2385e0ce6ac0f25f
-
Filesize
1KB
MD54153b336bf452a040674ebc7cf1aee22
SHA1177397d9a1f127ce530a40bfa868230ac86bd2fa
SHA25645debf4601667aaac3c14b861380f381f35754d3a428dd8e8dccdbda2e1392d9
SHA512271700abd5f3e25c5f672d44a1a7d20073f81c5d5a03eae52654677f6e0dd8d4c24003d98f1768899952ad8343f580aab5d2326f5e8dfde40ec973b58ef0fe09
-
Filesize
539B
MD554dca55f5f25f7018bd716f690d6b510
SHA1868978d688b38f6ad221973754b37fda368384e4
SHA2568a4e045fcc5179873704817f7c858b0d92808d61a6ed1aa127f3dd7754f74c18
SHA51211095fa4de41bc8c474237250a552106354487a651ed143d752e9b3a98a3da49b2aa64daed1e8ab0c355826861346caf51852cae8339d2a35ca66b18fdb9e5f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58cbd2590c1202018b9ffba87b6eeeb3f
SHA122da61f1f8f581c888684fb29cd6e94d70aff33e
SHA256f302384a16b6e5dce13f75d8ef6309d9f18d11a843b057f96baf10ac1243243d
SHA512ff8027eba611534fc11eb6586b16609d9adb9f0e13d4ca8bf5be8befe3aed15ee265ca96ffaafb4af32e75a7c54b78ea660f8ae89be0ec2533dbbbf72769b406
-
Filesize
11KB
MD5acf0168b1d5d0f1f80cf2c38104d85eb
SHA1cfdb48570a4edfdee075ca23c2318f8bbb31cd1a
SHA25629c4b79bf1b7b137268a14cf731da822f977b7df0f3958d5f3972118bb65765e
SHA5128d15f188a3926b29a1469a4c3d35ed72544fb7f588b16ad1377d7ce297bf0df5be160aba9b952835b61cbcd6df617dd496ffa8b823200bccf58ab15542084579