Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
eicar_com (1).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eicar_com (1).zip
Resource
win10v2004-20241007-en
General
-
Target
eicar_com (1).zip
-
Size
184B
-
MD5
6ce6f415d8475545be5ba114f208b0ff
-
SHA1
d27265074c9eac2e2122ed69294dbc4d7cce9141
-
SHA256
2546dcffc5ad854d4ddc64fbf056871cd5a00f2471cb7a5bfd4ac23b6e9eedad
-
SHA512
d9305862fe0bf552718d19db43075d88cffd768974627db60fa1a90a8d45563e035a6449663b8f66aac53791d77f37dbb5035159aa08e69fc473972022f80010
Malware Config
Signatures
-
EICAR Anti-Malware test file 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023cae-4.dat eicar_test_file -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133782570749559103" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 2120 msedge.exe 2120 msedge.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4804 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2120 msedge.exe 2120 msedge.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4804 7zFM.exe Token: 35 4804 7zFM.exe Token: SeSecurityPrivilege 4804 7zFM.exe Token: SeSecurityPrivilege 4804 7zFM.exe Token: SeBackupPrivilege 4888 svchost.exe Token: SeRestorePrivilege 4888 svchost.exe Token: SeSecurityPrivilege 4888 svchost.exe Token: SeTakeOwnershipPrivilege 4888 svchost.exe Token: 35 4888 svchost.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 4804 7zFM.exe 4804 7zFM.exe 4804 7zFM.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2120 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4804 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3700 2120 msedge.exe 95 PID 2120 wrote to memory of 3700 2120 msedge.exe 95 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 4872 2120 msedge.exe 96 PID 2120 wrote to memory of 3564 2120 msedge.exe 97 PID 2120 wrote to memory of 3564 2120 msedge.exe 97 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98 PID 2120 wrote to memory of 2924 2120 msedge.exe 98
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\eicar_com (1).zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbbad546f8,0x7ffbbad54708,0x7ffbbad547182⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12288406302028689991,12507924748599462091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xa0,0x124,0x7ffba97acc40,0x7ffba97acc4c,0x7ffba97acc582⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3320,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4516,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4748,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3384,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4216,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3404,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3548,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4440,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4752,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3560 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3536,i,17897581793403950861,346247041903504121,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3496 /prefetch:22⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c7a78fadb33c40d3bcb300f39cb418a8
SHA158d4e63c8ec24875d27c4058688642e6e25f8586
SHA2569bc82fd11d615372c6db1a70f576f23e572d6cff09fe152b64b4af127ae4f289
SHA51236cd1cc04e9843a597fce8652d46961142e47e2239d6e7733c809ffe3d4000f773ae554ae8b6386a2201d83024bdd81eadb0a92f072c98ef9a59defdbe7f1d45
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
216B
MD5f69bf4b362e266ba1d537a5dd00f8972
SHA183cbd0efe9d116fb9d5e0aa3a95bb99c1a7495b7
SHA2568c723f6eff93d65ce806f9b40287144c266414629abd0e0d415906138275c0dc
SHA5128d4513fb1e1eede11ce56b05527fe34f36be46637cb211c224d22e91c5e413ab7ac287bcc41cf5a12ca676052c359a88a48174b0e0c38279d63607ea565c7502
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5fed5268aee8b482a532580ecebadd975
SHA1ccd93c5d4e59824305bd053dee4797910356a0c5
SHA256136aa956fe3dd1baf34600d38ed7e47794e415af7a95866460d66ede5e57d671
SHA512368592af5e45b36bb461386e1c57111bf8b8db8a4254679c0f785fa9bbc39b425df1676d1e9b103542afc6ffd5716dcd8f7d38eae638e3c3e39049a9fb2ea794
-
Filesize
356B
MD53ea622a8a2948e8aa18a74bcb820f4c0
SHA15166042a8afad1f5bf3beff406b8d486e0607b02
SHA256055fdc09bee98d9823fbecafc3a83097da476345fbb72de715da8e1d8d94ae55
SHA5121ad44e5228a8c4bb5a23d97d8de5fb59c4f6bda266602f79f0133684e7279440eff410d9100b913a1ecc847fae892dad1a8eb94630d264b50fdfde05b482e5cf
-
Filesize
9KB
MD516976cf0a5a49d32557f7e7b693b07a4
SHA12435f666f56b58ebdc117e3182afee2d1a6d3668
SHA25664c0988f66a6953363b8f6cf18441ab1efe101f37451f1f578dcff16f131926f
SHA512b75786de194fe11989fc036a3f97653128ad15a8c595759a51dfe8e692313d363ff1e80ea5f2a8e776da64759591698593e318a2a340a6482bb86d255ba1269d
-
Filesize
9KB
MD5bc5ceefdf2945776cecb1e6d5af7524a
SHA189c1d8fa7d8271c9f12fe76034f4ffc358836786
SHA25652317d0ccc85120dce4c0b8cf8016ad2df156cffe9d7866591841fbace7105f6
SHA5128536746671abcc614df9d49df6ccb10b004102f38f2ae4cc99f12073d83e903d5832db2d81cb19a9a5a193d9654db7307c67f5e0efd90d603764f7dff8a12500
-
Filesize
9KB
MD5d23feaacf7dedd9078ed75dc48aca8d2
SHA16fa61b95f8887157ab85151ff53baab11d4d1398
SHA25617f65fc0281336b3add8f80cf70ebd0400b5bd4dfae13ddb6f3d18a43e08e952
SHA512d4133058d1b2d10f4a4781e850fd405686c0f352d86f463878eae71cbbec199b6382828cd5b06251746d56709b6696b7cb5c978ee11e388f6d84d8470ca66c36
-
Filesize
9KB
MD5931177b7286ad6104a7ed9de7c206be3
SHA190a86aeb77667db55570987267969140fa200c1c
SHA256d375eb8aaee8dcf7fb8d7ee9c8e2b87eaa8b6604ef4a8430e8630e31ba2f675e
SHA5125701dd4ed652e0f20ea1af523f2e08127c3361cf5a5e50ec4281ea764b9e52fedf9fa3e4bf28390e01323c62bbe2d8293693cc437426746da154c1401d34cb27
-
Filesize
15KB
MD5467efd0edd97267102dfc3c7d236a1d1
SHA1fa1c8c572b2a2bcd3f38bbe90e5353a9d32c6dc9
SHA25618daeeeb647533f376aa530d5ddbc9dd23aed1f84be188598b81761af2d5588e
SHA512cd86fc59ec4eb44c512ab0aa2f53ca6286b43b2e7cf8ad29574a2674831b86d737a86e7a47702038415177df4c6cace338f9b44f18e25d0be64b14dd78c4d112
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5843d182f9e4e736b849abd5eb6694b62
SHA125b2b5f7ccdf5745f5b2d51a4a5181bf1da0eed0
SHA256456d968a967067f74a46e8628910b0794a0a103e0b6f0922322d567765fb2c05
SHA512af356185d2d57db494f9758c1efd53b9826ffdabc1df1bf5fb5833362bcd79b6eaefd116fb7c79893a3092f29822bd596e2fee771431999dcf0ddc3d66970386
-
Filesize
230KB
MD5b1412334e8b1c075dd0b43132e886c7e
SHA14386580d5f1e47cf6fae973896f4197aacc42d7a
SHA256943f1ee3d8151242128ad08515f4bdc50bd2f600ea992561694c07c645806d74
SHA512b2e5655445f03e0d7e3aadcd116b3122fe5a735fd73b63ae2433ed462b5ea6b974ab384e2fb253422d1f3f2ae9ce411a96f0ec670e1e41771c50ff31a76d35fd
-
Filesize
116KB
MD565c7ceb4a88e13512ea187fa06e07d0f
SHA174c5e822891af16949dc27fd1ae8fe4924269373
SHA256647a0691867d7c8ddf5374e6155252db3ce87aefd1f28e5d07c1da10232b4f3c
SHA512a6f6f86e8db8e8a39d73fe004d83a4c01e663ca3de3ac47c99dc21081a472420f1d81600027b0bf919b910e02ebba062a47b234f0a72b7d40e502c7b3f699c35
-
Filesize
230KB
MD5feacff44c1b00144d12b4d231b5ae793
SHA1c685b4e29291b783aa0060bf32783da2204375b1
SHA256114bcd274acae373effeb3156c95ebb89c35b9641c4ae7e362431ed3e792d5f4
SHA512ab948429b6422f5b122ce3a6c67bd20afda7da9a60c01643d8aa365b5d7318acb5731af42f5e1eec15cb4f8afb4b57ac2398fea41c1bf031fce91fe10aa094b0
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
6KB
MD53d70c947353c1749cdad0753cbe65e86
SHA15331605099dce8a43f8b65f372dd134bd6ec4c02
SHA256b8532439511fe7f7727f63cee9fb8189a65c3ec83cfe66b442a1b73332562198
SHA51211a59a550d4277be565ae2f911f2ddaafb2abc617e9bbd3a954962ec48745edbb1e0b3005702fe60c2aedf39afc7231c9d34f8598dc4337561ed60648a6553f1
-
Filesize
5KB
MD52e233dfe19067be16b7e9f5870d5cb35
SHA1e70545ce96e59dca676596b48fa72d41a2d861fb
SHA2566df6d7b71fc454a187cb4f0163cbcfccd98525abffd5f2456de924fd4e5026f1
SHA512c8d60d2d7e998650ca88b85950134550a52a77f104d25a7a91d330e0f4ff81b0f7b2d223144376410d6154f7c886aeaf8602eddc22ccc9d6d423db872d556115
-
Filesize
10KB
MD5ddb81fbe832ddb1f0b305d9b5dddd99e
SHA14120eba612e90edf5db58133abdc9ae37484915c
SHA25654e20cfad017eba0800efde71b9b712574e47b901a1470bddfca43370e4be207
SHA512493c02c58b6f1b5276e799e9d9f6964e149b612a7712c445ac8ea25306f5f1bfdb4f667d6157be5dc76c4109864d52001b69c083e4d0ddfc57bcbf417d190ee4
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
68B
MD544d88612fea8a8f36de82e1278abb02f
SHA13395856ce81f2b7382dee72602f798b642f14140
SHA256275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
SHA512cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2004_1439132474\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2004_1439132474\c50d64e4-47b9-4de8-aa86-54a3a5b482a5.tmp
Filesize135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4