Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/08/2024, 04:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/iamtraction/ZOD
Resource
win11-20240802-en
General
-
Target
https://github.com/iamtraction/ZOD
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 32 raw.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677390323192625" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\42.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3276 msedge.exe 3276 msedge.exe 1964 identity_helper.exe 1964 identity_helper.exe 3332 msedge.exe 3332 msedge.exe 3000 msedge.exe 3000 msedge.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 788 3276 msedge.exe 81 PID 3276 wrote to memory of 788 3276 msedge.exe 81 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 4936 3276 msedge.exe 83 PID 3276 wrote to memory of 3164 3276 msedge.exe 84 PID 3276 wrote to memory of 3164 3276 msedge.exe 84 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85 PID 3276 wrote to memory of 4532 3276 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/iamtraction/ZOD1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffee3d23cb8,0x7ffee3d23cc8,0x7ffee3d23cd82⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2408 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,11183731584893869425,15132870280900345076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecfa1cc40,0x7ffecfa1cc4c,0x7ffecfa1cc582⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1764 /prefetch:22⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4748,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,8948816405223026431,4792879185298073286,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5424f0fbd6dfad8015a0b855a1d381e5e
SHA1b969c3cf50e877fdb3f8d3dc95047449507bba16
SHA25662d47d65ead38af68060c3f6f09a4c7c147fceae8fdd60cf62e252ffd3dcef5a
SHA5129f12ee310d612800fe6f9ad8c49fc819168d469b90848b90b2ab996e01b2a38e421b0ecd92bed604b5aaf59db29d16f3a77ad2d2fe8f8849f192f70f18a2ca0c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5d30a5618854b9da7bcfc03aeb0a594c4
SHA17f37105d7e5b1ecb270726915956c2271116eab7
SHA2563494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8
SHA512efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77
-
Filesize
152B
MD503a56f81ee69dd9727832df26709a1c9
SHA1ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b
SHA25665d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53
SHA512e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781
-
Filesize
23KB
MD5de8c6574e9057e4b6ea7b9437db4b9d5
SHA1265d520b6a04b434f5c3fc8c28debac183898db2
SHA25651f281fe367854904b3db4b6f4cd70ccf90414335716482aceef382c536ae746
SHA512cc8791772d03ee3f4b13654d2bd3354ab1ec28322ae3522187603bde00b1a5d940e99e62dda0fd3a7faf0ba9c3cd42425d0e64196f954bdb93c979f5e990e7dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5836040575118e758cb0285fa2634c72a
SHA109d75c9c1d62a22f31e1461d117709cefdd1c934
SHA256c0bc0fefb284cc8d61a382a77c31df1ff101ca1b243ff8e4efa05cee92a256d6
SHA512ef7e018165e1e28c3214f4ccacb033d85a93ff2bde67e340d1db21cf5532addcb8edb1d05cce42477143cc2e6717e10e588d1123cd89eb805e1ae94d2152396a
-
Filesize
579B
MD546fa4f5f7344089589d117bd7599b3a9
SHA1b6cc1fe19e527d4a372c97e4d195ed94eee40030
SHA256223280d95a13f1af6af06459bbf230874500c212a2e16f63914eff3f22e8b57a
SHA5126b680aedde7e806802652aab9ab31cb21438bc8756b063955e6f03bbbdf1273f7d47c40ec1a19fe27537afeb8d6cc219a246d31f7c6822b481649fe296e2a45c
-
Filesize
6KB
MD56e629ae1ac4da8ebe8a200c7540599fe
SHA1e45a73496c76ec4f9b23bf17af8dc23218dbc5c4
SHA256e8fae92c5fc0559e45cb44d80415e4c3193a7fd570096f1caecc99986b34cf4e
SHA512e9e37148940b1c07fb11cb33e7767c71cc4b96bc886a75354d6e83394e36dbf8a29be6929ef6217ef243adc0b7ea186ae433d702d84d6a8f4c7d60a160aa2ea7
-
Filesize
5KB
MD5c2692a6decea0792475a829553f3b19b
SHA13cb01b4bd8a9eda194d32353c7d83f68b665c097
SHA25639b4c252fb69aa2b0aa33766842374506ec0c1669b60f6ee7032e966c1f69914
SHA512ddccb6cb27714083a56857d36d3205751c1d6bb13635e477e4599f8f823bfeec3e95a0fdb77b3832c97f64acc7c956abbbd19b7a4e0784b6dd9f672654f4449c
-
Filesize
6KB
MD5ade88d375d544140232f47216fe9d17f
SHA1b19fc2f4dca9dff29c71e046fbe4716d39fd7280
SHA256e2c3412a0c9b32c32cdd830b205321dd425eba35a1dc24f6b29088f216319838
SHA51201585ee628ec4b08a17491202e4afdcec952228553a07eb25fb47c02046a89c01e7cc03a21b3a3598570e307ac5b612510f659b3c3777aebebdc7ef28c152d9a
-
Filesize
1KB
MD5b089cf018f35e2fd04130254fd1468a4
SHA13fe609b936e5f1d27e57ac62aa327970b042aedd
SHA256cb91c4eac50249e171b2245a95a4f7910896826f3deb4a8470ef8fc33d7a68bb
SHA512a3d9c416906d651f4f206e60dd2ec8e2b520a571a5bce927a13af6c4fff50842ba953b0697acc3948a42f07bfbb35a76686b0a209846c835fb1b3f6f8a07d246
-
Filesize
1KB
MD5c8c828b2073109a62fc53803b2f7c231
SHA12638f854007755756019698f8cc6ad4c568e76a2
SHA25687203c2f403352e96c1c2576c631a65242e6155080ce7b0b2f335e6862b2daa0
SHA5128dbf5df57ecfb5f9732f930aca098b9fc2cb939dabf3dea6ea0981cc99467fe60393ab8c58c0699f15241bf9064d5addff99e2c1826a358b780cc9145f31d1fe
-
Filesize
874B
MD5c4b6f72ea1c57241a6e803a0c7b716aa
SHA14f21a6e59fc1e11e2974f4dd78b022a09beb28cc
SHA256faf2da31036805a3e606710568e3b401cd8a05a994e07552b697ea40b093737b
SHA5126b0ce14a25802e5fe0e7d158836a41508d6a71befcb621ba41a15fea8097677318c0601d4eb08d55c15f4f6ec3a7714de2507f66595960fea3232f547837371e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD580197d34b688c91f9002d0982323faf5
SHA1fc69dd691fecb1bd8db5fb87ca54d01c132948e1
SHA256b21d9fefc816e88fdeb80cf4a2f93fe9d31625d609c009a88ef21a82c5436cf5
SHA5120f0e01a3f2a9bb7d46966a7913270679784940bbeb75eb21b184393fb55b0d90e66feba244dc16870ae0df8989de07d180b4101701ee2d553ad7cb45c998057b
-
Filesize
11KB
MD556c12567448cefa93b028be9d6cb23ab
SHA1edc9e5e1918cfe2ece5ad27357c154d1e4cff65d
SHA2564176020d0bf52307ec9e23613c029045302ae551f501bd9f557522f8089b59ec
SHA51276485187e99f54e8a88eb8bb09976092d972a54edca41dd2b3934119949acbfa4010c58f9318e9ed8fd6e134a6beca10be12e479333dad0c19e2d866df40c987
-
Filesize
41KB
MD51df9a18b18332f153918030b7b516615
SHA16c42c62696616b72bbfc88a4be4ead57aa7bc503
SHA256bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
SHA5126382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
Filesize
55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6