Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/09/2024, 13:41
240901-qzjg9aserf 401/09/2024, 13:40
240901-qy2x7ssbpl 301/09/2024, 13:39
240901-qx5byasemh 101/09/2024, 13:37
240901-qwvq4ssela 101/09/2024, 13:34
240901-qvfwkasaqq 401/09/2024, 13:28
240901-qq67ysscqd 301/09/2024, 13:25
240901-qpefjs1hpn 3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 13:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/LOwIP7
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/LOwIP7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133696708587281079" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 4916 msedge.exe 4916 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 3220 4916 msedge.exe 84 PID 4916 wrote to memory of 3220 4916 msedge.exe 84 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 752 4916 msedge.exe 85 PID 4916 wrote to memory of 2512 4916 msedge.exe 86 PID 4916 wrote to memory of 2512 4916 msedge.exe 86 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87 PID 4916 wrote to memory of 3052 4916 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/LOwIP71⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15497173250501529448,3867942606773605900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3996 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff9e5fcc40,0x7fff9e5fcc4c,0x7fff9e5fcc582⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3344,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4564,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4848,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5256,i,15055074185796692999,5604134685763443982,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD542596aeb10f0e0b8d1f745def3a1dda6
SHA13826879615ceb708193322706b10e743c73eea8b
SHA25666f1cf1358daf26d7955c3170db25908747513b5c7d698291760ee5f866a3e0d
SHA5128fb7d22de82b4f7d4d8a02e3040a5fd016bf5041ade63be3ac638d499871e17caad6787df6b22146a86d56cc37c47303dddd14bd598162c37c98a47da08a8228
-
Filesize
211KB
MD5e7226392c938e4e604d2175eb9f43ca1
SHA12098293f39aa0bcdd62e718f9212d9062fa283ab
SHA256d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1
SHA51263a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145
-
Filesize
216B
MD5c74fc2fa3e748b2abbfd40faa8366e57
SHA1646e17ce7ce439f4747a08178606827669eaf95b
SHA256bed487bae85a1d1c20bfcfb5b4591fef5801a1973298b27bb8f08149bfd367b2
SHA5120c30a3f6b992f2c84a5462582579ef5348a034f6b875df2af2afaac8385f1fdfd456e5f7264984de8c5e6961ab5206fc462fa89da90a96d01031df0708b8adc6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5e83e7b0f099b750a2b8cce0a7a604deb
SHA1a97c926381476f2f8810c9015b1ccbf5f7b116d9
SHA256ee03edc759aa0b8fa8ea9d5f996996c719b8353520d7b630f2faca5623eaed7f
SHA512a1430a93f080640ea7aa65e078dc0c8e08a32e058e57c1455720f4784f33a78ad1f8dbeabe8e10f4f24a99617e04588880dfeb3d6aaf50f623fb0a811aa4a96b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c406aa70-c58c-43b6-90f3-2d182b5187da.tmp
Filesize356B
MD58c5054fcba3df81fae1405840c503efe
SHA12a9e322506d0cbe44c9993dce7da987d1cc18d9c
SHA256ab47de968fa7f22c959b10877e1ea40e5cbd60b0eab91c6de94969f87d8e35cb
SHA512b27914dd852096cb2f2856b6f4ff1522068518a21e2cef2bfe4dfd7256ee19dae7aa8697ad9b4c4de8671f090ef074c07cf796336375a4c0336f4ab2ebcedcbd
-
Filesize
9KB
MD5b365f5e3a38e10455f65b0e9a6403cd9
SHA1c6315bb6a59d15b6cdcc26d6f56a496c68dcf8f2
SHA256ff207e2c49959bee3d0884d48f8addf66113cdfbc1de049999ed8fd0be6eb4de
SHA512ec88a4d19d995ce31f5a0d94bbd8dfaf948aaad9718101d6f43eaaed46d8d514c71f591e87e22c97eca9a024615100d1b2fc3c328444a8184bbe4ae652c8915b
-
Filesize
9KB
MD5a996631bbd18f54e37719fc16aa413a5
SHA15009c7c9de06bd3c66554448132c5418dbf0ba16
SHA25647f39d453718fc725c05a2063bca6f8c3ac9c2f24e0eee37f07a8d835e44c1b1
SHA512483d41bb6a25f618af89cfe1a1e3d522a75766d4fbdd69549b2cd03c0e4d0fc2dbf46e1bc69c3cb2cab183ec9ffac169b828dc9e14cb2aad6014332348d32619
-
Filesize
9KB
MD5e37fdfc18b659df3f84981baa9629121
SHA1a0046e6f6c29e4719e6b8bc2453e7c033ac5330c
SHA2566d15aa76e1a2c221bcca0bb57ca1cdd0b77a036b9af8701c78f08b5674ecf795
SHA5126d3e84b831d83a6cdc23821aa6dead4504b6f0f5754eafd0a5762d0a0dc0c93ea3b4e7ecd1d3bc4c699e7baff4370ce86fb4200b9f47c91d2186051efd8378d0
-
Filesize
9KB
MD530b3ebba9602bad30b8788d1ee89087e
SHA190ee93f8fc87f3b9c11e48b8a928326e5ff0959b
SHA25635064bc9e0349bed415450d31e9799d4e2eb5d44cd17cdd8e7088b6d2521cbbb
SHA5128f5b3d988e4ce35f340e5421a2d8e860e589ae2ecf34a7d6984d3d25cf67e794c6c0ea30b267084e559063c45dd4f0716fe65e4618f0feab5c9bc9719d2a7b32
-
Filesize
9KB
MD5719186c6d6937f1c671624b0e7108ace
SHA195544d8adddb7682438c8ef41f98847316ab9f43
SHA25665ab91839e5f3dbc0c2f15ff85c778e9674e5d389e6ead810e06e3d65c607fef
SHA5129e3d09a05010f1a365447f88b232af0c0a190286cdfedef3ee98556185410db43e56651a29414af33bd717bd8df2baede13bd2796f1ef2331d6019276f94b800
-
Filesize
15KB
MD58b3adf41b36291ee8f4806ff074e6e30
SHA1654bda5f927c51d8a9244b34cb59e7fbf53a41d4
SHA2562d5cfde431ddd38ab91b1d2fb64f82c04bb4325bc45ad716a508c6c01df546d6
SHA512d793d99772e63b4b8fd4d264db0128cefb908f9673718c13bb15caa28b9fb3c24a7d4857d1316d0ff7f3a11433f227c1c06697805739bf58b3bf697985cb5f62
-
Filesize
205KB
MD5a464ef42c6a16f7e8bb21ac1235e2a06
SHA1f60c6d6b389c9f0601d0c81d7946fc8f3b5ce93d
SHA256d14724ff83b0d44d98c38e71447b2a85eb0b7c3c7c59a96bab2ff9d7c546ea0d
SHA51266799313f6ba3f57a80d8cd8f60caa797a0c54e3ec19f4eb44c532821be57e357ed0d4f5cec61ba4577f8643ea1e60d27d57e3b777b5ef11f316021105bda0a7
-
Filesize
205KB
MD553ed6ef3fbbd4031812deaf66fdf1f5d
SHA1da31658f86fcb64f30538dad6aeb828939a83322
SHA256f6a5b0c4264e449229245ecd312d4b03f6616bd8e187c68743ed8651232a0fb1
SHA5121d6fc4bfc48774fb7356840b4dea107cb7ad54942d2452a62491311a4d711609a234bd54780120591351c9ddd8325af4747df7f672e97eeb2435c4bb63c1affd
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD54a610c5285b64596338abfdb4af0a1f5
SHA19bba8488100bc21558cb73e3089e84a1562b5419
SHA256aef1e457525d1b8aacff2d114338706fb00e6537d847b560e12f2713a9bcbbe4
SHA512c8d32450524344451fa9fc6e39975543867d845bbadcbacb66aea2e1262aaf478e3409d8dbe3a3622d1319da89494ba2a17119bf9c1d80099a12644430dbc2c1
-
Filesize
856B
MD51eccf1287cf82440fba6554a3fa1e8f4
SHA15653eff368e03967fd59b3feafb2081b6bf7a72b
SHA25661a5ec0a1468395bb6ce6c0b31d65409cc49d0ba5463494311fd74f8c812038b
SHA512fda73c5ea19397c973b21964be183f263e9f2d689e5dee656c9fcde4da13c58ea2aa3855ef988978fb4eb1e1189bce5b02407c69f681cae6f04c99cb424505ef
-
Filesize
6KB
MD57b423102b1ad6ed10ab9cb9dde0504f2
SHA1a7940157c90e1e5b80fa1132590b68fd7aa6e4f2
SHA256eb75622410051ff84dc2c51f8eab187dc2797d1a15f77ae684f0068dbb32f179
SHA51214aa6968a22267b83274adff61382c7d32bb96be478488e1b12a2517cd5dc10da72bd792ae8f6ba4147fe1ba6a8e56b465f5a43458aa6530b27a8339e06e82b2
-
Filesize
5KB
MD5ed3eb70e536517b7ec443329e196d4f3
SHA1d2a2a160327ff3f8fd32ae6e57eba33691efb3a3
SHA25627a911d488313c06ab33e179c706041da72dfd5bb3b8d8a52ea1586526ca7e91
SHA512b8837a435563b5236b82e71676fcee2023f5d8e2f9d0390a1f6ea2a60dff0a995eadc965292b4746448bb6194930360a0cac853acdf42c206060bb4ec30e526f
-
Filesize
6KB
MD5a64aba671df565c4c418f0a6a8ee0b98
SHA17a2806725f10c1b75cb033532c01c147ef510da3
SHA256c4dd8d719a83f93f9a3c78fbbc6c0c5b8e58e39326f99aeac280f7d7a0ed7475
SHA512184bfe5ae10f82da5437950ac8e5aff2c2cb7f7b76fc8c7bdfe1aa1fe16acef6f57d802be84ab9e56f613fa7928b26279d9cf4fd46ca0293f0d68ece6f48693b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56afbafbfff665c2e261ad6cd98402137
SHA1eece1a6a110c808edd0d7035382cc7a33ab0219e
SHA2565c4035c7a0fd9cd7bcbfea89e54d80a03ded0033f7cd0a314423c99e4e6c0abc
SHA5126d451cc4ab1b46829180b8f2c136bcb33a9fe6f378a5daea060a0fc50129830e0d4a28def4fd00fbace6303d14be268ae497ec429da09e979d82c0026af58189
-
Filesize
11KB
MD5768d812e863b260b1a3f8eea412155a8
SHA1f1c2542145c9ff230c0ec120a189ea6e1a605f69
SHA2561fb0fec01212b1613dbd7cb2c97c94d71bf3a39006e5c5851935fd9f17c612fa
SHA512315e01192edb2308ac0af69c78e3342b80b763e679139cddea5f28883132a2c99cbb15f67f77f48465dd628a1f2c427cf9b09d153c4b4aba798f53140983d859