Analysis
-
max time kernel
102s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://waveexecutor.com/
Resource
win10v2004-20240910-en
General
-
Target
https://waveexecutor.com/
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705471512548698" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 1560 msedge.exe 1560 msedge.exe 5004 identity_helper.exe 5004 identity_helper.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1612 1560 msedge.exe 82 PID 1560 wrote to memory of 1612 1560 msedge.exe 82 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 2020 1560 msedge.exe 83 PID 1560 wrote to memory of 4024 1560 msedge.exe 84 PID 1560 wrote to memory of 4024 1560 msedge.exe 84 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85 PID 1560 wrote to memory of 2748 1560 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://waveexecutor.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff26d146f8,0x7fff26d14708,0x7fff26d147182⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:82⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7164 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,14174745725984983999,13817109279660495472,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6732 /prefetch:82⤵PID:4660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff2676cc40,0x7fff2676cc4c,0x7fff2676cc582⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1756,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=1740 /prefetch:22⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1544,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2052 /prefetch:32⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3724,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=4400 /prefetch:12⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5476,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5500,i,6394086204432655553,820353908107949466,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5f682d91525917eeeb1dc952a4004f6da
SHA1a47a948426d9b01bca7121b7ff15396e34e3d1db
SHA2565079277624894538883fe03b0f932496ef0ec2cd5ebf2233109399385d818f58
SHA5122eb1cad6be9d656cc02c64d577136bdb6c31777cbd1fb08e63a6aa9e192656dfdaa9d0a267e5cc551a59c323df03a60a0824c0d5036d10655c35a7a9a7e758a1
-
Filesize
8KB
MD580660d564a507ff99c99b158aa356372
SHA11f18beaa3a1688073d505a46cb2f0c95cd883a1c
SHA2565b36b6243c316b885a26a2fd9587bada7b77c61c18d34bb711565df2197d3f22
SHA512ca54138cf8f9fd4ab07b18a481e1cf76f9548caa2b362a14e9a38d2beb54376f476c911f847338f7d6cb4c6e2ed95bfb142b749b6f4a77f34a994905ca55cbf8
-
Filesize
15KB
MD518187d57da9b7e8547d0471e33908664
SHA1519c24d9e1a045b7c4a0c1d22a124ee0215c4197
SHA25658c9235e7bd9ce49d07370732d3ce1190b87b5a9c23d588b5bd4722fc4d7d665
SHA51205f0d136cadddb83aa10bdc7e96979eab4a36388f4a0c9e67ec43cd0bcf78e1b9c69f2bd3c21568944bf5d03dfc95c190a2c06512f08a714071b8e195c7e8889
-
Filesize
112KB
MD5ad4a08825bbed0f97b5104a2801294a9
SHA11be76dfd56d6ac550371dcb482021d5c1badbf86
SHA256aeca86836168796ed5c4ab5deeea46fcc327697de20c9e70c91117bae8c135f4
SHA512385699bd98bd23c2081b9631f7cfbb6f6fd106893b1ec8fc085a5462787c8a44deadef160204b4f3613ba6cc9fa148cf4f4f0a24500ccf4d864288fff2863e32
-
Filesize
220KB
MD511816778ef8cfe3a4c97a97e145ad0b9
SHA1f164e670ff629b8efcb3d25f2afa59a106538071
SHA256fba9ba54c2b3980ccf511ea88c78dabc535f7a1cf362a86bfb59e0881899ad27
SHA512da06cd95518dcf81fee40a94398de972946ac1754dd19aa9eb20971d57edb3aca29fdb34b0b8dc804e001ca79a23146cff57051e281dfe0a3b9750d4fa2bea6a
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5a3d0f75db8463c2a976ae5031ac41926
SHA195219fa08a79094eafe8832142c0f2bb3a115421
SHA256e6849adfbc46ee61355286ec68fe5945574d430e109ca2315a6530adf812fc6c
SHA5125df703cff772b6bd4d7ae2b1be73f905c673e89e4a3d7db7dbbb978b5058d9d6421b0b0d89b150af5f522874a1375f59a6549b675ea28554e1618190fda685de
-
Filesize
3KB
MD541f4ced17b7e41e1b235610942dbdeb9
SHA1285ba9482720c49241a99506fe240fa3bd4a09b3
SHA256cf7b23c845c49fdd1ea811fac420408148c72836d247722a649b5c4555760ed7
SHA512af202fc7d0ec81362b8fc9e858a2bc972468995dfa3bf36ec72f6eba23d5c5a2de816a5da8d5a13100bc4862a38a2d793c68638b8616ba1a9f729b64fb835f88
-
Filesize
3KB
MD5ede76301ee1d196ec2ffa4de33409c01
SHA17382fa1dd1b65dc17de3be7484f1cc58db5dce80
SHA25611b9107ce2b948eb867d6a529c527f2ff5ab469f4f7c9ccc6699d1e44c24f418
SHA5120dd4e060202fb6bad195aa76d6d9f354430f0dbcd280fed15d7a640f169b4a138e9800f45fea4f2d10fa488f4b81c0209993575f206b14985570424aa401561a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
8KB
MD57085cdfe831c224bd1433740d69870a7
SHA18e47b3f598af038c4256a188026243726d1e3de6
SHA256f2dc49bddd4aa746140ec14ae1f1efc7887ba4fd2cb67af36e8bb0c6c4813ed6
SHA512ff68909f41a8718e7a768df017ef8517c518ca638e8d70e759f4e814561590ca2e32718f0592ae05f07ceadd66d6aae7f21b151b800e24f9d3a73fd12d62d3d8
-
Filesize
8KB
MD5882a37b288e521009564e208ea1f5341
SHA171ec7d4f710cb5e61ea15445e8d36127d1817401
SHA25623cd7c71182d07a01410f3dc728d9cdce69869f8721012f033af981b205ac394
SHA5128de6599be6c49ba7ff3263fa686a2540e2737405890c5f7ace3e20a3949d27122ed4f4338cc094a1b48e806e5a97eb94d13d03d4847284a0381e50e49f15da95
-
Filesize
6KB
MD5e49b351230d11505fe67b6cfb96c8119
SHA115a2d6f390b42bbf89facc8d252aed3e7f23acff
SHA2562f6aed91868f28623d44bfcca316884464d40af0d25b7adeeb4273657a0d2706
SHA5124e065002409280b2a772f3040c8bb783f37280d09b22e9d95e5b057733bbb9028be446ab0af09408a8300c98559611004dc083c116fc42e6cd2109a2b3497635
-
Filesize
8KB
MD5c0d6724b668fccb197b7122acf1978cb
SHA1aceb79ef8993b22bae17c0c6057d92b26baf82ab
SHA256223a3602941cb46f761088c4e99938bcb45fa070137be4889b312ac69b3c3870
SHA5122fa934fde68098137b0765b2bb522505d690a8dbdb0ed23bc43499a568f6558c91b3b2520575d639619dd57933989d6973af7a875ed02a319e1e7b360f95cc0d
-
Filesize
8KB
MD54ca260b335dcb0b4b71b5c08d2f270b3
SHA13b4552dade707361363b5c879aaf98dea9ae0b3c
SHA2567f365ba283c01fdb5cf0fbcdbc02f463828ceb79c9b6a1507511d18d78895106
SHA51295896e1c179df24357c391066e53d6e791b3310163c7405619abdd98df2aeaf1d7e391ce9415c3929c2518e07ebe206f1096854bf25f656069e19509f46b602a
-
Filesize
371B
MD5f7ddb7be45f62b875afb4738ae5ba210
SHA11f05ac1a31c3f82c0afb0ebfa099967318c71c69
SHA2566793bbf9b84c2bcb6b9d887ac8c3c85f1d8159daac55b91121f17642a91c9e2a
SHA5123e99f4be75b8fc4a13747dc2c8033334fa9199aa4b33a0fdf9a273a46ceb1b4238ef1d7dc3029472f6f05418d1ea95701f5880d9ff647ceef206e5e0f0b4acc5
-
Filesize
371B
MD5db88e07795e5369ec989acbfc6e378e2
SHA15c31c166a9dacb602f825171e6113256be959ec3
SHA256f0867a22ac33db939f931c4587edd575f0b7bc9e9594f3b4be89996f2847ad3c
SHA5125fa30b9738136deb1a4a21aeb459eea5f4fe44925a2812bed0c3c7b3af7750175eff43b960db5614b6dbadc83d93f3fbf786fe73115dca62909df97fe69aa6e9
-
Filesize
204B
MD50a9959a86876868d4875604eb96315a2
SHA190fc6cdde2f102dbc8a76b185162bd197d331b24
SHA256084f935d0b58f2680d5684a689f118ff9fae95fe4633ac3b7a67d85ceaaff174
SHA5128183b13b7ae7218f90b7e09dc9955068d315a2027a007fb21608b03ed4b006d35cd291dbf8a3efa65394572599f92f51e2f1742e1a7d7827b6c4e0d3f57586a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59f310c271dfd8ff23614e911e9e1b849
SHA11704407ffbe6ddf07183d4c0c2c2c086783d4f21
SHA2562ac519177508157735a1d168a1a106d39149f5d163dd2078176fee6b0bc1d0a0
SHA512312415508edb7624742270e6c985336dc1c97d51727695521a649ad45db6306594e92acba25f8c8c1b3c69c579f43bb5862cf3ab9ba00e0582acb156f98a5af3
-
Filesize
10KB
MD513068db8aebaf5d1ce483b4e8c043e00
SHA1aba80c5041abaef7d7ff47c6f9f275efab48858f
SHA256cca9c07ab2dc8ad8de109f2aae56167daf587b3e01c21c4bd4d646863188b5eb
SHA5123b17fc465a082d466e150f2088ab3fe223c916433bb5af1933013bc826dbf16201d62afd0996dcdbf6eca42ffbdd4fc87983d0b16531dbd0103cd0256269d84c