Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Aethercord...dex.js
windows7-x64
3Aethercord...dex.js
windows10-2004-x64
3Aethercord...dex.js
windows7-x64
3Aethercord...dex.js
windows10-2004-x64
3Aethercord...dex.js
windows7-x64
3Aethercord...dex.js
windows10-2004-x64
3Aethercord...dex.js
windows7-x64
3Aethercord...dex.js
windows10-2004-x64
3Aethercord...ors.js
windows7-x64
3Aethercord...ors.js
windows10-2004-x64
3Aethercord...anr.js
windows7-x64
3Aethercord...anr.js
windows10-2004-x64
3Aethercord...age.js
windows7-x64
3Aethercord...age.js
windows10-2004-x64
3Aethercord...ser.js
windows7-x64
3Aethercord...ser.js
windows10-2004-x64
3Aethercord.../ut.js
windows7-x64
3Aethercord.../ut.js
windows10-2004-x64
3Aethercord.../ut.js
windows7-x64
3Aethercord.../ut.js
windows10-2004-x64
3Aethercord.../ut.js
windows7-x64
3Aethercord.../ut.js
windows10-2004-x64
3Aethercord.../ut.js
windows7-x64
3Aethercord.../ut.js
windows10-2004-x64
3Aethercord.../ut.js
windows7-x64
3Aethercord.../ut.js
windows10-2004-x64
3Aethercord.../ut.js
windows7-x64
3Aethercord.../ut.js
windows10-2004-x64
3Aethercord...che.js
windows7-x64
3Aethercord...che.js
windows10-2004-x64
3Aethercord...ort.js
windows7-x64
3Aethercord...ort.js
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:17
Behavioral task
behavioral1
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/replay/cjs/index.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/replay/cjs/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/replay/esm/index.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/replay/esm/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/types/cjs/index.js
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/types/cjs/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/types/esm/index.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/types/esm/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/aggregate-errors.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/aggregate-errors.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/anr.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/anr.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/baggage.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/baggage.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/browser.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/browser.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/ut.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/cache.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/cache.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/clientreport.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/utils/cjs/clientreport.js
Resource
win10v2004-20241007-en
General
-
Target
Aethercord/modules/discord_desktop_core-1/discord_desktop_core/core_asar/app/node_modules/@sentry/replay/cjs/index.js
-
Size
306KB
-
MD5
71c276c784fe1b70bcbb5bdd9b78a1b0
-
SHA1
876b31bd7da157503b238ecd5114460ba2db3bf3
-
SHA256
a0eae8dbd884141cd61e8ff677f7a69e658af5762cec2295d5d78e9659f23668
-
SHA512
ab360790b80b8ddea3a208743addd6f3370583f041b29822084e1bb775ee562874d84cd105d1cbea21351d53f6522881dd95ec3921cdf6c6dad7484839b31b0a
-
SSDEEP
3072:LMXEYkyLsAgORwiSCXCJ1sNCwKJDccQXA6QTt6BZhEbtYUGFKoQKR:iXgEXCJ1ticv+Ebtzdon
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133728964353568195" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4089630652-1596403869-279772308-1000\{B2DBD988-B4D9-409E-8FF8-55727F24BF95} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 648 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2780 3056 chrome.exe 97 PID 3056 wrote to memory of 2780 3056 chrome.exe 97 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 3288 3056 chrome.exe 98 PID 3056 wrote to memory of 4396 3056 chrome.exe 99 PID 3056 wrote to memory of 4396 3056 chrome.exe 99 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100 PID 3056 wrote to memory of 1444 3056 chrome.exe 100
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Aethercord\modules\discord_desktop_core-1\discord_desktop_core\core_asar\app\node_modules\@sentry\replay\cjs\index.js1⤵PID:3388
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3480
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9daaccc40,0x7ff9daaccc4c,0x7ff9daaccc582⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3296,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4472,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4640,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4492,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4892,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4976,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5056,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3388,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5200,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5132,i,15969742576583891817,5448206741144002034,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:82⤵
- Modifies registry class
PID:3268
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3656
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x2f41⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD51e9b235d5a45b8f4d45a999c0a7a861c
SHA1d7ae14405d98ac9893b647592314170348e7e91a
SHA25628fe9aa6f40f7a1b725a2be84ca9c1aa9901ddd3b28626d04146610109fbb7bc
SHA5127c97a698dbab65cbf7db72d43c2b2f290c59b8b8fe2d3f77f5365c588e1102b113cdae0057f0484d3300deca008e5161c697bca943022013ce347dee78985faf
-
Filesize
227KB
MD50a77c35610c2724ad2e064d486fc2c9a
SHA150800cb47d0074536e2ac262d930918d89ed6269
SHA256d0ad1e29b8adb79f17cb2d543717be8f085dac163780d89a58043053fcfe319a
SHA512922d1015681709dd8fbe7dcd6a356dd35e181406c09a56c19acb49172d50bc32f271146208bb326c4aee2d567125f0706f82fc2d3570e7c800a132003b21ffa7
-
Filesize
232KB
MD5517ce706c238b0fad9c481310538edbd
SHA103a181e1841701f8f99b245e90440da16bb31898
SHA25604f00bd730efafc7f97b74d5c12029329ef248ae5c505d6bd4b52107b5c92b01
SHA512b7876859287b27aab6729ad1045eb5144e54f4c4e25459400dced675b459c92230ecf9a22240dca9513d658d74c7c3de67d7d928c09f4ab19d922cb3f0d36cf6
-
Filesize
32KB
MD589cbcf66426a7fbbd1b609e78e2c5692
SHA10c1b87c3d8a68c3fdc3b0bd48b2fa9ae050647e7
SHA256fa123a2e53b815ee85e5d5300f8d03224aa6df98ae17f6a3e9495e9b0c276301
SHA512fbbee97c1c18cb62f41dc999cd6140e4d8b2e6018075668b9f4d25ad95c331ea212aac4abc2ee66d03989b55b2b0b6ec864ff606b8b046ae63c3a3057a6b1973
-
Filesize
24KB
MD51ec619690ff13adb1e8e1cd0687eaa46
SHA1e78fb83ed3afdaa5cc7da17e596697a91066a793
SHA256bd2839eefc09271d91d97de3d8066f487e7a19cfa44501cbc048f7653c2428f1
SHA51278ed9fa002c396a873b84b912cd883453b43eaf5b975957ebd00e91df46056d5cac24a1eeb701b4e69953381b7a4f6392435b9861c5aef8ae6311ac7b5952f9b
-
Filesize
32KB
MD572f7172a1a7ae03b9c68c41f73866eab
SHA1741b72ab79366b250512ec7b0959ccc12dbf0d49
SHA256a141870d293d4e47043e6cc748897915f3cd42a6edf0ddc2ff9275756b145e90
SHA5125b1e8d27b5c310adc2bdb658a9391d6aa1286774fad1f09bf2c42e8be071727198c23c16a417369222275aa89cb38af34b8c7bafc19ba52ef46473b73018dd22
-
Filesize
20KB
MD5c81b620f62478ae71d3f19a691c3f7b3
SHA11e9b87e78c706b712cc6765288102d77e08b4927
SHA256c10d789b9a08aebfbbcda53a5ac6ea4dd1adf5edc0afc0512f8b872946e4231d
SHA5122cd4c0da0f9b466a83a16fd8a6ce0b8475fafb0fe7e3686e7091e67b6679950119eefd4abf27bdf8000fd2003cdb8e0420b5e1ad5064e1a204bdf8cbaa136fda
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5a69442c62c04427f4512c0a0a5bf08ea
SHA172ac6c0bae3d5743568484d83da1c26e1f087b48
SHA256001aaa57581025c8ef27d41cf6b369be2595b22247c1be9148077290c5934892
SHA512e07c240593c16ac9bf499a0a274e4be89a4f6f3b6a8d34ae6ebc9cdca969415fc0db127bdc6532db3f2fc1617277d6861942f49aff31bf66aa1d122c508907cf
-
Filesize
849B
MD5b8a7c2bbf45c2e448ab1012d37c74a0a
SHA1a7404c96978bef41963af66165dbe8bec08ea476
SHA256b6d4471ad32dcec5db4efbeb1b67c831637a39eb2dd9d52cdde5fdf797a33f28
SHA51282fe42262c9e4b53937400d8d35fbf56e9a1768190e816570787bd4a03234458c6134138a66550fee1d0ea768e35b5c80ceeb6eae5ea5f0fda6992f78930cfcb
-
Filesize
1014B
MD5714f433cc2e51598dcf7f8a76774b969
SHA169de28d21ca634f4fb33bd72c6ffa8768d2009be
SHA2567963207ec95783de4e9d53f428f0ec73f4e24a7cb125c826fe6efa25fedad402
SHA51293a34b593180fc01c15630c21f0d0d1da7f9d53bdd60a00f22d00066e6c23d542895527bd89eb9aabd1f08eb9c1e2c876af4f1b776aa3b960f86ad492487e144
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5b604327cd022267f93abb97da08bf3cd
SHA155f956ee3a476c7fc7faf67157e1c8ecab0a1310
SHA256c2b721e488dfc3334bdfbed152e18652685bf247a367b589cebad9e50f6c6a08
SHA5122cbb1ccdc199c091e1292cd7c413ea289f7ee2524be493f93ce900e8d47b98ab21ffa7993411526ef2fb49d36a82ae6b15f3d68dd94e34043c3ed6a52db94e27
-
Filesize
9KB
MD5f6d3057ae078ece8390bf5fba37e014b
SHA14463d49ae68a7cc6c43e50b7ffac80c214ebe277
SHA2562cfc11110fa50c91f45b3d405cd1d3eea839f2b8eea91407230cdb39b470244c
SHA512512bbb147f352a1f5b8736a8b7d8996f3de07d0b7d2cf1fe42cdf7ec2816f1f13b98c22ff67f3054e86cd95c5191cbc5842bbcf9a5769232740ea79782861244
-
Filesize
10KB
MD5bdd25098637618fd53807e4ccd147ac7
SHA128a15880a87694a4123d65f50a4cf24bd0fbcdb8
SHA256a275719e87c99722f7b1047955c330b6c8113cdf63838cd1eb1b8db755d88a38
SHA51289cf37a3b0e6dc31c7b8a57475aef349cf0f4ce2b8324c33d248e2804b7563417d577a38c5045cfb7a610abc2ac83453880ccd7fa6e2098f8459f4020602fbc2
-
Filesize
15KB
MD549c44f4f45afd948f15ff05253e76e38
SHA1b070fa0f86a1c9bca48e0cbbf361b22e8e4c373a
SHA256fa33ec11ec77577923cfb426f2739e25aab92945c2edcea6faab42a6c4473f88
SHA5125e4a83e62cc82c322c227cb88dfe34e9c20ab48cd999254a92b47c6035b0fee2d50ade3cd1e056a9a22c8b7aeefe8eee47268941907378a0541c67b77c3e8c74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\210300e5-49ae-4780-8c08-8453008e60e0\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\a47c4b31-ffd3-4a39-ba62-c7c35f2db4b2\index-dir\the-real-index
Filesize2KB
MD599a891ec032a57ee84300c5df63466cf
SHA15c384edbe2ff80fd35ceb7606ef99f92010fc467
SHA256ee8a70b9399932252c13b39a6b4b9ca9514422defee09b98cc7d6d1447e731af
SHA5123f702d5bd3e89d37d3d95a77644f4c8a8ba570fdcf257e172b1c70d92bebc32dfea9f409c8560405abab6fb04202ddb78efbb5d67af3fdbde072bd3296553d7f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\a47c4b31-ffd3-4a39-ba62-c7c35f2db4b2\index-dir\the-real-index~RFe59ec3b.TMP
Filesize48B
MD52678eb3332a33449edad6382c6dcf2cd
SHA14a0e1a16de48a5526a72c534fd04e6384b36214a
SHA2563b80a99a98cb1849f734e22b2007d502e7dd77cdd3bcddc1886d2ad55146cacf
SHA5128705b4205cdc1105bdbfc6b182d548ff0b7ee0e69bd331199dd71dacb39d6044af062a381a377d3fb1ace1f5dd19a241e7a85879dde7c808d01b0073bfebd535
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD52169b087af953e4c4b3e9c9e47cfa4bc
SHA1935b45bc7f36eafb485a94239536836a1ca617a1
SHA2565f6a0db1f3c1385fa10825bf2aaafd675579604f74c2551ab52a2a417f5624e4
SHA512e63c1664fd5d8cca3e55c179cc42aa58e031514ad7756ab5c5bd3d320cb93825157eb8107ad859e0a160d162ca1d855ab15994388b4a330bd60be0370a792380
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize178B
MD555ac399a81f11ce5332301a1902d6539
SHA15680cd0059d12d8213bd2c31fea2e6dc85509da2
SHA256acdd7f7fd42f683dc4347996fc41f070631bbcb117e64e2ae9af84907d767306
SHA512c5af0096d6a1a5551d1aecbfe81ebeb2e84717c7997c53bcfd0b13b6d3091a82faa54014c07826dbd916c2359570e8a32e44c9fff05bc7c46bf997211d620f60
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5f2e42adea3a292206dba609e0aa9b240
SHA146bc7a9271bb5b895a891fcfe0887de427a9d435
SHA2569ef315df007c0e4d056ed5fc253d343f471308c12835502036fd7c9b20eb6ace
SHA512e54fbc07269d9e3698161c34cc511e11047f06e7e539e7b8790e5546224d09051ef9f04cab982e0c4349351aec0105419ad18781ba527fada44bc8bf641b7027
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize187B
MD51227139e81f9bce6ceb0c4a375901b78
SHA17463c299e4ba1df5180f232d899e8e2a5e798599
SHA256aa469bc89ae78305588d80762ecebe15dcd8c892c18bb1622d93a4a24ded75b1
SHA512990d7a62f0174771a6fdd89329cbe1db3a12c5ac1cdcb821d91349a145c8edf44e8c0284651a5c84e93a0fa8458c1cc5a6bf98a26e609cd9f8451c18a50c9e23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD5d0f4c0498c5258b964801fa5f546316f
SHA1d11a2be3e2275236caec929b824f192157cfe397
SHA25648547d967275925e154f8db9862102f426f514eedd908a1a93ee34b45bf8cf44
SHA51212d5d8d6e261e8e93bcd66c5845ff33ae6ddf820276c5fcefb9465bfca624a74c0b27ade86fd89a6b330f9ab22ea52d4ef5d313522f1796debfeb97fbddfce72
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe59d1fc.TMP
Filesize119B
MD5c05c2b59b50044bf87ddfcd7cb69b567
SHA15285dc3c98145b5237667bd3e7c62fa1cd9f0cd0
SHA2566d1e0a1b01b60e3f47927ff7fc6c011f1bd734d0be6ca7a7bf027b02bc1ba43e
SHA512637e2d41532178c9b1db4ef0851e19034e91109ba79d9d9a2a82a2e1444dcb02df1e3ee503a13845f303ad0dfc4b396b24c28a8402c5faaa03b4540da05f9949
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir3056_1005603415\Shortcuts Menu Icons\Monochrome\0\512.png
Filesize2KB
MD5206fd9669027c437a36fbf7d73657db7
SHA18dee68de4deac72e86bbb28b8e5a915df3b5f3a5
SHA2560d17a989f42bc129aca8e755871a7025acb6292ce06ca2437e95bedbc328fa18
SHA5122c89878ec8466edf1f214d918aefc6a9b3de46d06ffacff4fdb85566560e94068601b1e4377d9d2eabefdc1c7f09eb46b00cf4545e377cc84a69edf8e57e48b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir3056_1005603415\Shortcuts Menu Icons\Monochrome\1\512.png
Filesize10KB
MD5529a0ad2f85dff6370e98e206ecb6ef9
SHA17a4ff97f02962afeca94f1815168f41ba54b0691
SHA25631db550eb9c0d9afd316dc85cdfd832510e2c48e7d37d4a610c175667a4599c6
SHA512d00e2d741a0a6321c92a4aab632f8f3bafd33c0e2875f37868e195ed5e7200a647b4c83358edcef5fc7acbc5c57f70410903f39eac76e23e88a342ac5c9c21cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir3056_880743581\Icons Monochrome\16.png
Filesize214B
MD51b3a4d1adc56ac66cd8b46c98f33e41b
SHA1de87dc114f12e1865922f89ebc127966b0b9a1b7
SHA2560fb35eacb91ab06f09431370f330ba290725119417f166facaf5f134499978bd
SHA512ce89a67b088bae8dcd763f9a9b3655ed90485b24646d93de44533744dfcf947c96571e252d1ad80bdec1530ff2b72b012e8fff7178f1b4e957090f0f4c959e0d