Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02/01/2025, 19:25

General

  • Target

    RavenGen.exe

  • Size

    6.1MB

  • MD5

    c8aeb6df26f168f40e546ea284f3a12a

  • SHA1

    8b6fd323ab0860e838e359b47cb0c432e37dd9bd

  • SHA256

    a5795f05ca4de63e25ecfe7636a77e4d4e2d48963931f35dcad728dc4cd08956

  • SHA512

    4f86e47e76ce8dd0b374142988d4e82849a96768443fb5e1c65cfc3b527578296125dce7fc7619afc8ef4df40eb3c098128c31137215ea73237fc1c07d78351c

  • SSDEEP

    196608:bSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:OkSopwtQQl2aOtXADu8X9Y95GQLJ

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RavenGen.exe
    "C:\Users\Admin\AppData\Local\Temp\RavenGen.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:3592
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1808
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:192
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
      2⤵
      • Uses browser remote debugging
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffcec1bcc40,0x7ffcec1bcc4c,0x7ffcec1bcc58
        3⤵
          PID:1096
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-logging --headless=new --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --disable-logging --field-trial-handle=1924,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1916 /prefetch:2
          3⤵
            PID:3300
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=1948,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1960 /prefetch:3
            3⤵
              PID:4852
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=2156,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2172 /prefetch:8
              3⤵
                PID:2840
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3100 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:252
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3148 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4600
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4428 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4584
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4664,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4360 /prefetch:8
                3⤵
                  PID:5736
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4696,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4360 /prefetch:8
                  3⤵
                    PID:5972
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4996,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4704 /prefetch:8
                    3⤵
                      PID:5132
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4992,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4716 /prefetch:8
                      3⤵
                        PID:5196
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=5152,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5164 /prefetch:8
                        3⤵
                          PID:5248
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=5144,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4928 /prefetch:8
                          3⤵
                            PID:5856
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5320,i,1317626867760762358,4484995476215778097,262144 --disable-features=PaintHolding --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5344 /prefetch:2
                            3⤵
                            • Uses browser remote debugging
                            PID:6012
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                          2⤵
                          • System Network Configuration Discovery: Wi-Fi Discovery
                          PID:5468
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            3⤵
                              PID:5520
                            • C:\Windows\system32\netsh.exe
                              netsh wlan show profile
                              3⤵
                              • Event Triggered Execution: Netsh Helper DLL
                              • System Network Configuration Discovery: Wi-Fi Discovery
                              PID:5540
                            • C:\Windows\system32\findstr.exe
                              findstr All
                              3⤵
                                PID:5552
                            • C:\Windows\SYSTEM32\cmd.exe
                              "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                              2⤵
                                PID:5780
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  3⤵
                                    PID:5840
                                  • C:\Windows\system32\netsh.exe
                                    netsh wlan show networks mode=bssid
                                    3⤵
                                    • Event Triggered Execution: Netsh Helper DLL
                                    PID:5872
                                • C:\Users\Admin\AppData\Roaming\svchost.exe
                                  "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5464
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                                  2⤵
                                  • Uses browser remote debugging
                                  • Drops file in Windows directory
                                  • Enumerates system info in registry
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2176
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.109 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.86 --initial-client-data=0x25c,0x260,0x264,0x258,0x304,0x7ffcf29d6070,0x7ffcf29d607c,0x7ffcf29d6088
                                    3⤵
                                      PID:5780
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --subproc-heap-profiling --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2256,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2248 /prefetch:2
                                      3⤵
                                        PID:5456
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --subproc-heap-profiling --field-trial-handle=2276,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2724 /prefetch:3
                                        3⤵
                                          PID:5436
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --subproc-heap-profiling --field-trial-handle=2836,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2828 /prefetch:8
                                          3⤵
                                            PID:5460
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --subproc-heap-profiling --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3636,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3632 /prefetch:1
                                            3⤵
                                            • Uses browser remote debugging
                                            PID:3096
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --subproc-heap-profiling --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3704,i,17435563427957355058,3390742841295993401,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3780 /prefetch:1
                                            3⤵
                                            • Uses browser remote debugging
                                            PID:5076
                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                          "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:5824
                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                          "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:2740
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\57ed0d66-e240-4e18-aa84-b7fd4485f4bb.bat"
                                          2⤵
                                            PID:5184
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              3⤵
                                                PID:3836
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /F /PID 3592
                                                3⤵
                                                • Kills process with taskkill
                                                PID:2328
                                              • C:\Windows\system32\timeout.exe
                                                timeout /T 2 /NOBREAK
                                                3⤵
                                                • Delays execution with timeout.exe
                                                PID:5208
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4056,i,6673326894638893842,871609780509303087,262144 --variations-seed-version --mojo-platform-channel-handle=780 /prefetch:8
                                            1⤵
                                              PID:1596
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:1716
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                1⤵
                                                  PID:5808
                                                • C:\Windows\system32\msiexec.exe
                                                  C:\Windows\system32\msiexec.exe /V
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6056
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\131.0.2903.86\elevation_service.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\131.0.2903.86\elevation_service.exe"
                                                  1⤵
                                                    PID:1104

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                    Filesize

                                                    851B

                                                    MD5

                                                    07ffbe5f24ca348723ff8c6c488abfb8

                                                    SHA1

                                                    6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                    SHA256

                                                    6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                    SHA512

                                                    7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                    Filesize

                                                    854B

                                                    MD5

                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                    SHA1

                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                    SHA256

                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                    SHA512

                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    280B

                                                    MD5

                                                    cfcbadee7b1893b722888585ccb436bd

                                                    SHA1

                                                    a0291f4cb1fa4c0aed5b00cbf2133ec02de91f46

                                                    SHA256

                                                    a0597ea481309b6ee5f6da663205a6181534ef0d63a76a4129964c0f3add54bd

                                                    SHA512

                                                    07c16650e30651d862d8dec9c9d29267d722ce180db463477f4a34133a8766a6e6105affaa00ca95cc758d4bb7d393cc8cac30fccbf727c6adad97b02659ae47

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\32a1880b-9e73-4892-a908-e0fdbcfee380.tmp

                                                    Filesize

                                                    1B

                                                    MD5

                                                    5058f1af8388633f609cadb75a75dc9d

                                                    SHA1

                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                    SHA256

                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                    SHA512

                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    37KB

                                                    MD5

                                                    a2c70433dafa06a6a7478534c6c356ac

                                                    SHA1

                                                    0cf4a6c2c422120e2360b854ad6c6db52ca89a83

                                                    SHA256

                                                    13a9d5faf74110ea0e09dc7f3fb555afc20e2d47648fa6f6c4a0c5b56385d4fb

                                                    SHA512

                                                    966a216267beec5c31a8c173ab9096d867579ec2992091939ff20beb78e2a24b75add0be76d1c63439d574d003e94cd31c6a11e271bceb35eb1651806310a082

                                                  • C:\Users\Admin\AppData\Local\Temp\57ed0d66-e240-4e18-aa84-b7fd4485f4bb.bat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    4663e43219297b901319fb59a8f3b672

                                                    SHA1

                                                    66f83e522e61e94c075b909c5182f09eec837218

                                                    SHA256

                                                    5aab26898f7a316eebd2c067735b49abb9c28074a7815ba572c1cb8b0131f035

                                                    SHA512

                                                    3cd800475fcef820aaa65be2cf6463f49996bdc008f665d940ad98067e6afb7ef30cae40f260b33aecc3d981e719d339986c2e7a077d1fa6a8174b153999d9f0

                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir3432_981654399\CRX_INSTALL\_locales\en\messages.json

                                                    Filesize

                                                    711B

                                                    MD5

                                                    558659936250e03cc14b60ebf648aa09

                                                    SHA1

                                                    32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                    SHA256

                                                    2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                    SHA512

                                                    1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\Browsers\Firefox\Bookmarks.txt

                                                    Filesize

                                                    220B

                                                    MD5

                                                    2ab1fd921b6c195114e506007ba9fe05

                                                    SHA1

                                                    90033c6ee56461ca959482c9692cf6cfb6c5c6af

                                                    SHA256

                                                    c79cfdd6d0757eb52fbb021e7f0da1a2a8f1dd81dcd3a4e62239778545a09ecc

                                                    SHA512

                                                    4f0570d7c7762ecb4dcf3171ae67da3c56aa044419695e5a05f318e550f1a910a616f5691b15abfe831b654718ec97a534914bd172aa7a963609ebd8e1fae0a5

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\Browsers\Microsoft Edge\Cookies.txt

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    d48cca56e342f903670e74296bee14ac

                                                    SHA1

                                                    a13a4a8ac64eacb8a4a6468a30abb3953b6cd94e

                                                    SHA256

                                                    d9bf00ea94fb8dbbe8f74db6cc2d74bc1fe78b3435bcacfc923b772ec2214e5e

                                                    SHA512

                                                    96db627ac8264d2aaf02d3183d6ebe8eb6c74313fb573ce34018aa6ee1a2991dfe33fc84ee124fb90e48b8a4ca23f99185c81ffbdf9dbb82977cc6807e144f19

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Apps.txt

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    75066bc681be65247639c19138497a76

                                                    SHA1

                                                    aeca3421b5393fd1ca1aa4994dfef2d74a0a90af

                                                    SHA256

                                                    4f82b7600b0180fea8cfce2207f96e25ab6c72580cbeb2b1a486b3963c102103

                                                    SHA512

                                                    90e8718a907a01f4d64fa499efb13ddbdc75ed4309e300effc494d61ac5ba7801e46d40a88048558fee62b1b6a4921148924f996bafd2775050e9e1ae23084ae

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    8e1ad8cfd4966487a9067d2e7adb1472

                                                    SHA1

                                                    2b37f915ed99aed78ef8dc470aeffa8f83a53b98

                                                    SHA256

                                                    1035c9f176744c3dc35b72b4d4560c949404dc3cc1797cb911ed08b34a377ad3

                                                    SHA512

                                                    7e05b4918f771066a22426e13707133f24fbc5eb25f6181740c036306ab13ab634358400de242cc71e839b4e0542871d629ffdf12e6c7079e0c46a338e3d0601

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    fc3df2118d6cd356141888eba694ce55

                                                    SHA1

                                                    6cfe7e3d0ea0b581ab11e1a5212bb023e71a3f10

                                                    SHA256

                                                    1f1e6acf93e3b424c9463faed674cfdb028ccc4d2362682d457a70d12e1a418d

                                                    SHA512

                                                    02881847422f996adce6aa81b334855340d0a1140cf79099d6756ae27654954045daee3e7c9781cf8974e827bd18c0849401814448895f636ef4fd0193deb82c

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    4KB

                                                    MD5

                                                    aa06ce20304f22f2e1e0347edd343973

                                                    SHA1

                                                    24caf1c2e0d15fb94d6c7793f2bcf57bdb64dae4

                                                    SHA256

                                                    d225123567675be57f724e310435b02f9eef169d0aef5b279219e71b24980ea5

                                                    SHA512

                                                    3bfcef59c8f4fb8bd0d6236abf767270bebac49d2f2c329fd58a198b76fda06fe055ff98c31402adb85b8f62ae8a9dc71d41ec2ff5820d4461a0c89f94d6c84a

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    580B

                                                    MD5

                                                    75b24a0a92ffe1ef6cc531b0e3e5f636

                                                    SHA1

                                                    21af27c8b4e3c3ae28012841e43b82001a425148

                                                    SHA256

                                                    d1d9062a833b0d6acdb6935860ded7558bd20a512b4a1b04987750c08cf87885

                                                    SHA512

                                                    5558e19a5875a75e94c7651477806018f1bcb65767adae330bf5be67e43848d4020bfdae8a6d5b325f1e23ea71d32bbff191c6e757f96ff4f89b197fbe8ba8a8

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    933B

                                                    MD5

                                                    9b05ea64237f1a367b141b13db574efb

                                                    SHA1

                                                    1d39f508aae106deee8da81d6ca43a14372f08e6

                                                    SHA256

                                                    dc10708c8cfa6615c3e95b35ffbc582a04526647474f4eae1c34003f533bd32f

                                                    SHA512

                                                    b3f279a9f54c0aa93c6785be91fe526ef50030b8c1c79727d77f624fbb4b8e6394a0eadca293804c1dae01b7aa6ea6c0f3b438bd74d5a6bf8c8cc8c2c25f2e82

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    e7bb866b228c1cd190551ce235b82032

                                                    SHA1

                                                    770a3b0229d653f51a9df89cb305eccfedcb129b

                                                    SHA256

                                                    cfad3dd37d4ffd6675bc293a973062ecc7a0048370faa20e4a978307c99a2cdf

                                                    SHA512

                                                    b09fe7a3d2fa388a516635e3a6ccd0326d9ace715256fa10700b9de8831adf3a4024feb20d99b9a64d2ddc79d3e1b38757dc3f96cedd5b7daff4606fdd6f5d27

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    7133dc14312789f121cdea64a7dcd682

                                                    SHA1

                                                    ba7f054fef637d4d95e133039e37d02336b54c0a

                                                    SHA256

                                                    49894a60ab0a68887e3723cfaef60aeccf3e50ee05fa32df6883485735d16103

                                                    SHA512

                                                    c233fdd0e006063fefdfab537e3f18ba99d257b3dfc25e4c719b2b995f1006a5046d21a2347d8c819bb7435a37f54f1d502434bcd5e00e295af8ec33041f984b

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    11c18a243cd5ef2818587c1293ff708b

                                                    SHA1

                                                    58257e36b2c0ae3577f96623958907910c5941ae

                                                    SHA256

                                                    7e9a82f99782e94570690c77fca0b4d50ab3453b7ba6b7d422959d8c830fb19d

                                                    SHA512

                                                    f2fe9316ab3a88f82865d2ed45b2e379aa57ee55a7bc2e36c59c78c990cfbdc4c083370f80e2dd342cca348bf610a354a983408d2561969cef5687bcd6c3648d

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\Admin@WYKESHLM_en-US\System\Process.txt

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    b1475c790798c1d3c515622f7e41dd2b

                                                    SHA1

                                                    5c9b451822587302974deafcc0f4838b6749d977

                                                    SHA256

                                                    00b819bbc44676d8c5848bc20feaa6369552ac4efd8361f2e8ccb9f75429beaf

                                                    SHA512

                                                    8cacc0249413cb801f3e80e0890c5242ec78376f42e8042c6e44910fa3c5ab3f4aa88a8ea73976cf24a87119c7ab5c255b6e421d292308c0a3140c35a4e816af

                                                  • C:\Users\Admin\AppData\Local\af988e18efb1e7f0a87d8de63bbda9ab\msgid.dat

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d3d9446802a44259755d38e6d163e820

                                                    SHA1

                                                    b1d5781111d84f7b3fe45a0852e59758cd7a87e5

                                                    SHA256

                                                    4a44dc15364204a80fe80e9039455cc1608281820fe2b24f1e5233ade6af1dd5

                                                    SHA512

                                                    3c11e4f316c956a27655902dc1a19b925b8887d59eff791eea63edc8a05454ec594d5eb0f40ae151df87acd6e101761ecc5bb0d3b829bf3a85f5432493b22f37

                                                  • C:\Users\Admin\AppData\Roaming\svchost.exe

                                                    Filesize

                                                    63KB

                                                    MD5

                                                    67ca41c73d556cc4cfc67fc5b425bbbd

                                                    SHA1

                                                    ada7f812cd581c493630eca83bf38c0f8b32b186

                                                    SHA256

                                                    23d2e491a8c7f2f7f344764e6879d9566c9a3e55a3788038e48b346c068dde5b

                                                    SHA512

                                                    0dceb6468147cd2497adf31843389a78460ed5abe2c5a13488fc55a2d202ee6ce0271821d3cf12bc1f09a4d6b79a737ea3bccfc2bb87f89b3fff6410fa85ec02

                                                  • memory/1808-19-0x00007FFCF1710000-0x00007FFCF21D2000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1808-17-0x0000000000790000-0x00000000007A6000-memory.dmp

                                                    Filesize

                                                    88KB

                                                  • memory/1808-18-0x00007FFCF1710000-0x00007FFCF21D2000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3592-87-0x00007FFCF1713000-0x00007FFCF1715000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3592-34-0x00000243734E0000-0x0000024373592000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/3592-573-0x0000024373A20000-0x0000024373A42000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/3592-168-0x00007FFCF1710000-0x00007FFCF21D2000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3592-2-0x00007FFCF1710000-0x00007FFCF21D2000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3592-764-0x0000024373A50000-0x0000024373A94000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/3592-765-0x0000024373A90000-0x0000024373AAA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/3592-814-0x0000024373AB0000-0x0000024373B50000-memory.dmp

                                                    Filesize

                                                    640KB

                                                  • memory/3592-0-0x00007FFCF1713000-0x00007FFCF1715000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3592-1-0x0000024358430000-0x0000024358A46000-memory.dmp

                                                    Filesize

                                                    6.1MB

                                                  • memory/3592-837-0x00007FFCF1710000-0x00007FFCF21D2000-memory.dmp

                                                    Filesize

                                                    10.8MB