Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
758B
-
MD5
b144c6474ff9af1cd84d457af7faaf24
-
SHA1
42ea69f9aca2e686ffd506247906350cd5e31283
-
SHA256
bc6cb4517aa20743771670b0fa35889855f2ba655d9a575216e20b06492e2a6e
-
SHA512
b038696eb458fb39bc7d67f5b184aee17aea2e7e02d4acd6985795f2e68d1f60e314a30d07501a64bdf1dbd99109963588a16d2439d2b0609d246f61bf5ec662
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133702819214381523" chrome.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4596 msedge.exe 4596 msedge.exe 4588 identity_helper.exe 4588 identity_helper.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2740 4596 msedge.exe 83 PID 4596 wrote to memory of 2740 4596 msedge.exe 83 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4028 4596 msedge.exe 84 PID 4596 wrote to memory of 4384 4596 msedge.exe 85 PID 4596 wrote to memory of 4384 4596 msedge.exe 85 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86 PID 4596 wrote to memory of 2840 4596 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,16733368702875040973,5692174233313413205,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc5d35cc40,0x7ffc5d35cc4c,0x7ffc5d35cc582⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1788,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1964,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3404,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5116,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4556,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4372 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3260,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3188,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4840,i,12995139465487477214,9777325143316612600,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD56ece4f53f7c7a7b153289e0d4c697983
SHA17369d5ec7b15b0af2263d820a5c9d15caeeeb108
SHA256c8bda94900b0393d522eb1632f27b465cf8792dbc5995716c80be9308939fcf6
SHA512f5c570125a2399480cfacf624d37ad3057f14f09c0e182929d4e5fbdda1fba09625c6c16957c35ff622c75b32b8b540c6f15b92f7dc62921602d11f7d2329393
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD521213e60ed19f3137f92af0ba5b7f08d
SHA1bae68aff606538fa2952061c2ff74169b5b7b14d
SHA256c2b9db258e0e6c9f2ebdb44ceb4973a1aaa6949b48337a8d9f1b7b37f329e5e7
SHA512389f70edc1b240b2ec3742a08db38e95a7c787bc77d9e94f976be9154c740259cb67629eaaf69000fc6a42fb33e311a9df046f8c939469eb933313411180d834
-
Filesize
10KB
MD56d2a75d331f80f46529260028f750423
SHA14a67475b329b6c162f6c3ec437173de3831b2837
SHA256c380da3b384b6054ea213e2d4b2366a84a3977f0d5f894b1cd5b0b6cae6d839f
SHA51254bbb7c672cef0dd15f00c50476981fe9145dca0b603f8b7567c9a4fce9e392d458252b2d5c827e9322c75be9007363e9a85ea491cce8e0b54a4ffa2d1836447
-
Filesize
10KB
MD5859006b4e7665028f87f5d6ecbe69700
SHA1d47847e471989723aad4479ec6cd1536b84cd9af
SHA2565c686421635ff81928ea98b92cbb264aa5bb84bf635eec8c4ac25ef6cd4679b3
SHA51252c7f763ad6de272925bf186c6f16656f20162f9f5877c90a0b8ce055160732e843da79d2bbd7605ff11ca9d8a67a151fc5f097a0ddfb1268e2ed91bf1e29396
-
Filesize
15KB
MD5f5e9bb19b85e6a13a540bcd94edd820f
SHA165d1ffedb4895db7d5c687b7be9ce520e6d49449
SHA2567560ef8eebde3e649503f802ee7e44b10625e975fdedf9c09a4fbea5310f4483
SHA512a9abfa27dee3d3a3557fbed7cb2d004a1d76f151978c349bf8777299ccd3a4a39634c72efac3d40ec1b4718875abc298c9afda4be295a6c7df8857afece48898
-
Filesize
205KB
MD5aefddf5261f284fb401ead793427bdda
SHA127f2656dbad9fd016e4cc8e2c46f3862da0e3359
SHA2569356e34f1b346a766bdeb0083ce8f7ecc03d3be88b922544e333b7e86f6e0e1a
SHA512cfecea45e84c2a22c30c0e5ea1f00a27415e4e00d6dc7dcd7cced8e050908e4cd5a3388eed63e0bea219e2ebdc19f3c204ff37cc528614a16f7bfe686b086fa7
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD542163a9221672ee084bb7d414ec4e03b
SHA166ea6f7adc26f3e0d680a6a3df11b373b6b51beb
SHA25610326732334a64763259651080d3c48572e02ad37db2a212892870feb4a52e0d
SHA512ce0e97802ca3a583bb6e8d9213542bcf70bc533d6b3073ccff4a5d1dd892805792b1aad5e7c990b43cb46f0efef8c8e2858ceec1c8dee4d0fbaea64a26bb2142
-
Filesize
5KB
MD506630f9c68f0c19140b912fc7c302a15
SHA13c98f7c0e34588f8a57e67c8594fdea30a508e33
SHA256d13824005b1bc331c470cc42bce6d31ee9d31351c4bad504e58a4b221603fb73
SHA5122532d9c2a4a6e1ec61ba68fe5bb2e02c717a6564832e21a954c3a4b978ac936d061af6f86d4a61f30a7ae03064342aa1f53edd3619a57ac3217fe99f62d40ef2
-
Filesize
6KB
MD5ac0b65f3857f1008fe61e639638adfe9
SHA14ad9dd63a6696701cf500101bd8d512f0da7ed69
SHA25630032a1e6149967e86f1ae33cb874482662af37ac39f2435173c1ffdbf604ba8
SHA51293d24d4ad06a82f7236d59683867468c19a636622f802657d267d1d2fd0d6a500e26d03964319ef7c954b5f1810f61f61b007db3422254428dfb7f0090581f9d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD565c3d46dc00dcc7f92df45422c7c8438
SHA1702dbd34db21b80a291fbb8e6a6c9672507c8582
SHA256aa6e4f7b0003a7489f760e4ab15d3790c366e30c4bfc36405462f53f879a62ba
SHA512436681aed073d536d6d778967a0532900dcb275c43630ad951b6d748853b2d0dc8aedee13e29b54abf6f24c0ad45b22d6e967dd562b68334945e613f66b690f5
-
Filesize
10KB
MD5058c678ce81a8109d8fad046ab8c586e
SHA12b6b9cc58d5b61e798d3703ee6feb8cd728ccc9e
SHA256c1f0d621cd97e1e7a7fe1d2bb4630e21289e042e10a7e0c13d780273e667f8cf
SHA5122af2aeca18ea98b1ef69a436baee6d9f6c0fe2d14a3ec0176bb3f5a3110ed439dde95d001d307f95e8ddbb9506719d1bc48e0297dcea3072e72b50b6947186aa
-
Filesize
264KB
MD5c630ae811ccc4e71655a839785b1df7e
SHA1ef08334abc5937ec288dd6b30d93b70a1ab765f4
SHA256f3e0c7543495dc3c2e8eb7f1050bfcb0d34fc3b1c593accb0ca28c5b79258cf6
SHA512d49a0242d5b1a5534eada01e4a22dee08da3d0d6826ea286787f71827b9f35d4eb6bf50c3c042ec76469b9215d7b43e0ea33e11563ddc8a71ef20233cddddc5a