Resubmissions

09-02-2025 18:43

250209-xc9t9azjfz 6

09-02-2025 18:18

250209-wx2tpsypex 6

09-02-2025 17:43

250209-wa19naxrgk 10

09-02-2025 17:24

250209-vynsssxnhp 8

09-02-2025 17:01

250209-vjteqsxnds 6

09-02-2025 14:35

250209-ryd2tatqek 1

09-02-2025 14:24

250209-rqq2eatnhn 7

09-02-2025 13:39

250209-qx2k2ssqdw 8

09-02-2025 13:24

250209-qndgvsslbn 6

Analysis

  • max time kernel
    397s
  • max time network
    379s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-en
  • resource tags

    arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-02-2025 20:14

General

  • Target

    test.txt

  • Size

    18B

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\test.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\test.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2376
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=2132,i,2736955615342517531,6776059445485411500,262144 --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:14
    1⤵
      PID:3008
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGluc3RhbGxkYXRldGltZT0iMTczODk1NjQ2OSIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI5MTM1MzQ4MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUzMjY5NjE0NjgiLz48L2FwcD48L3JlcXVlc3Q-
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:3192
    • C:\Windows\SysWOW64\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "0" "1592" "1268" "1156" "1272" "0" "0" "0" "0" "0" "0" "0" "0"
      1⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:2956
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDIzQjBFNkYtRDgzMi00NjM2LUEyQTAtNDgxRUNDRTBENTRGfSIgdXNlcmlkPSJ7QTdDREQ5RTAtNkU1OC00RTkyLTk1OTQtMEE2OTk4ODcxQ0E2fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins3RDJBMzNCNC0wM0UxLTRGMzItQUM3OS0xRkVGMEJGOEMwRUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSIxMzMuMC4zMDY1LjUxIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMSIgaW5zdGFsbGRhdGV0aW1lPSIxNzM4OTU1OTg2Ij48ZXZlbnQgZXZlbnR0eXBlPSIzMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iNCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTMzNTg2Nzc5OCIvPjwvYXBwPjwvcmVxdWVzdD4
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2696
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDIzQjBFNkYtRDgzMi00NjM2LUEyQTAtNDgxRUNDRTBENTRGfSIgdXNlcmlkPSJ7QTdDREQ5RTAtNkU1OC00RTkyLTk1OTQtMEE2OTk4ODcxQ0E2fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins3QzJGMkU2Ny0wQThBLTQ2QkItQjRDQS0xQkU3NkRDNkM1ODR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMSIgY29ob3J0PSJycmZAMC42MCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIxIiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9IntFRTgzQjkzNS0yMTBGLTRFNzktOTg3OS02MTAzNjcwMTFGRTV9Ii8-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjEzMy4wLjMwNjUuNTEiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iMSIgY29ob3J0PSJycmZAMC44NyIgb29iZV9pbnN0YWxsX3RpbWU9IjE4NDQ2NzQ0MDczNzA5NTUxNjA2IiB1cGRhdGVfY291bnQ9IjEiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM4MzQzMTQwMTM2OTM2NzAiPjx1cGRhdGVjaGVjay8-PHBpbmcgYWN0aXZlPSIxIiBhPSIxIiByPSIxIiBhZD0iNjYxMiIgcmQ9IjY2MTIiIHBpbmdfZnJlc2huZXNzPSJ7MUJEQjBFOUUtOUMzQy00MDMwLTlEMjEtNkNDREQxMTlEMkFBfSIvPjwvYXBwPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIxMzIuMC4yOTU3LjE0MCIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGNvaG9ydD0icnJmQDAuNDMiIHVwZGF0ZV9jb3VudD0iMSI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIxIiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9InswNzM0NEQxMi1BNEY0LTQ4OTQtQkM3My00QkZEQzBFNkJDQzF9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:3680
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4080,i,2736955615342517531,6776059445485411500,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:14
      1⤵
        PID:3128
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4100,i,2736955615342517531,6776059445485411500,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:14
        1⤵
          PID:780
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5236,i,2736955615342517531,6776059445485411500,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:14
          1⤵
            PID:4904
          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4252
          • C:\Windows\system32\SearchIndexer.exe
            C:\Windows\system32\SearchIndexer.exe /Embedding
            1⤵
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Windows\System32\SearchProtocolHost.exe
              "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
              2⤵
              • Modifies data under HKEY_USERS
              PID:8
            • C:\Windows\system32\SearchFilterHost.exe
              "C:\Windows\system32\SearchFilterHost.exe" 832 2764 2760 820 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
              2⤵
              • Modifies data under HKEY_USERS
              PID:1420
            • C:\Windows\system32\SearchFilterHost.exe
              "C:\Windows\system32\SearchFilterHost.exe" 832 2776 2756 820 {85EE815A-7738-4808-A14A-3AD87E32A3BF}
              2⤵
              • Modifies data under HKEY_USERS
              PID:4956
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=3788,i,2736955615342517531,6776059445485411500,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:14
            1⤵
              PID:4196
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe"
              1⤵
              • Drops file in Windows directory
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4744
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95965cc40,0x7ff95965cc4c,0x7ff95965cc58
                2⤵
                  PID:3004
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=1820 /prefetch:2
                  2⤵
                    PID:2272
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2120 /prefetch:3
                    2⤵
                      PID:2040
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2220 /prefetch:8
                      2⤵
                        PID:1196
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3096 /prefetch:1
                        2⤵
                          PID:2368
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3256 /prefetch:1
                          2⤵
                            PID:2524
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4428 /prefetch:1
                            2⤵
                              PID:3988
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4572,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3548 /prefetch:8
                              2⤵
                                PID:1144
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4400,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4704 /prefetch:8
                                2⤵
                                  PID:2472
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4440,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4340 /prefetch:1
                                  2⤵
                                    PID:180
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3548,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5052 /prefetch:8
                                    2⤵
                                      PID:2612
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5056,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4644 /prefetch:8
                                      2⤵
                                      • Modifies registry class
                                      PID:4536
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4696,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2900 /prefetch:1
                                      2⤵
                                        PID:3140
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4804 /prefetch:8
                                        2⤵
                                          PID:1404
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3248,i,5498333091297644921,754833479354450977,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4996 /prefetch:8
                                          2⤵
                                            PID:2672
                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                          1⤵
                                            PID:3964
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                            1⤵
                                              PID:4680
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                              1⤵
                                                PID:3272
                                              • C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE
                                                "C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE"
                                                1⤵
                                                  PID:2220

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                  Filesize

                                                  351KB

                                                  MD5

                                                  0500b815327dcc24e5a97b7bab0ac72e

                                                  SHA1

                                                  46aa25cb83e7eeffbfb5a63f49e4564d66bbcbfc

                                                  SHA256

                                                  3afdbd5666d457039a6a4b6b974ca9610dac7b3589175c0bb2305820ab6c17ab

                                                  SHA512

                                                  c2e8dc07a53f05659d54d1f3afe08e212985eb1bfe03249550b1cf6f781ab8937323e17910deb4c2d8a9c6580742e55a0fdbf52e142a06ab62d72456ea097852

                                                • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                  Filesize

                                                  371KB

                                                  MD5

                                                  df6e7ff8cace97d1554167db97cfb131

                                                  SHA1

                                                  6f28eb58ebc45b16ea49c32cb2d8884ac570d961

                                                  SHA256

                                                  913c93f74e08d4d0ae7e2b47268083a897da5fb9bfa8b3e0ebc289c522b1dcb4

                                                  SHA512

                                                  9aa21b8746205330a8a79e401bd4bb7cd5cbc6aff3c7833ffe3211cab9303ebcfb225218139c14c3063b146eec9be92debed287dafaa636c6d51429657e33769

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  288B

                                                  MD5

                                                  e422e4120371de348becf0cf1ead6784

                                                  SHA1

                                                  57e8d6f27d8fe79a88078545cfbbffba5cc95dde

                                                  SHA256

                                                  2a84ac9a88ad4bcefebe3a6cb4ba41d29a8c4c6ded793fa63299577133ec977f

                                                  SHA512

                                                  878661769bfe68e6935fe725c9357c39fd86fe82687dba658739267d5898c5ea50d5abd2bc3dccaed45ccde253542ca35f01b165a5b5d48536b219cdbcad3b4e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  596f1a3a9bfc6d4af801cb03ef1271f1

                                                  SHA1

                                                  584871b83f394b0a4bc35c440be20a37fcdf6e52

                                                  SHA256

                                                  2131b4bdfa4f9e228baec3783c796335b2907c8de6bd87309beb703c47ff5bc9

                                                  SHA512

                                                  c26d19f7f43449381b3bcb03292c519e209d0e7d64324997c30d43c935baebd4f9eddbc4f697a262aa7417260f78471e4a806937f1e18920228fc7c73276ae52

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  352B

                                                  MD5

                                                  4952e09063911d7385b4934a9aeecf01

                                                  SHA1

                                                  f7e54f8a102d3b42fb2113bfcea4d7108a5287f7

                                                  SHA256

                                                  cdac6027bf24603cc9bb44e307aaf19722689553d043ffbcb2a64b3bf3f461ff

                                                  SHA512

                                                  15bee65a7054e03e64b1a3a6f818e697339a833ea22adaefb3a01d9f5dc69e11b73b33530a4a334488ff379d7d9b10398d7cbacae1cb1b2c3c3a8a6a97e6b5c9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  01b24f2a1e1b26b60a62e29c346f2994

                                                  SHA1

                                                  861328d482da79c52aa9c9c07a37631a47d0cb36

                                                  SHA256

                                                  418463dd1c0adbcbf9f2ed9ff8e4b80635c0e111bce1e00a098f0902a770893f

                                                  SHA512

                                                  928a017872c2ea3e6b63f1b0eabc49fe8a11e63426d5615c0bf03a39a103a4c8556a11f3a5a4c5f527671d50ed95dd20448a06e09fad4ea44dd45ee7f44b2487

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  f2a8ff52019de33b2e60f3003f7aa619

                                                  SHA1

                                                  3d9ba2c4c38f84b405af4b2b98d6d026c5e90a4c

                                                  SHA256

                                                  956d0eed921638540ed6412ab0634a6fe5b73e8388e0a86a81a7b900906a980c

                                                  SHA512

                                                  6c3a5148a2e1356da86a7bfb344f16212a42eff09e7be59f74d534aff260ad4bfc47829503ba694cd41b0eca17300d6d1edf6c37391a84071b1c59dcc054bad4

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  ba7f330f414f833169185cddf776ea2c

                                                  SHA1

                                                  9c87b1e4c4bb76b0d47270855d4959da283e4054

                                                  SHA256

                                                  d0df4c4234f8dddac1976d1957ebcf18175898f1645f44dbfa146209cf884cbc

                                                  SHA512

                                                  b1f76c8005cd0e7b3092a8343d1838f053f833507f8462c833c4b72a7cb598ed7896cfbf6b9449a81310ca6987b82a5865f953f0254921a075cc4b8ac692ced2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  63f98072b276ca92c6bfe6835698d673

                                                  SHA1

                                                  5be86be74e204189a2d14bf08afe2327cd0659df

                                                  SHA256

                                                  036d40679a01e8632da814d1b830b2d77c0105a6636ad1bd58719b3654672cb3

                                                  SHA512

                                                  158b7c0acd8ab858cb650cfc2a321236843e2803a1c4803c28dde7bf02fbbf02f15e07826aea3ba2252761e43a7c6633913b61535c80c3ba3115e834ebe5cf13

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  245KB

                                                  MD5

                                                  e8777447968346b43a8781ba4c2663ef

                                                  SHA1

                                                  00661989376630db197720534ccf6ea1df649dd6

                                                  SHA256

                                                  9dd45dc8b3b9ae2e7128f5f8eb0fb872827d2e99f466aca7b22d956b42f423af

                                                  SHA512

                                                  15b8b3bd03daf80413217c761defc34afa7c934d3db80485c2999419a7057e9ac9a958f771daab30ec928e00a05fab0ad462d99da417f762ad28fdb8c41dcfec

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  245KB

                                                  MD5

                                                  2955f7f505360d38e517f09f40bae7b3

                                                  SHA1

                                                  7a090ec81711b718a3ba39461d7009659a99fdb5

                                                  SHA256

                                                  9e1fc0aa90e3ecca2831c9701c8303ddec3dc5dba6dee6401fd954c83c0c2997

                                                  SHA512

                                                  1cd57b45970abfc90a4dfa7d68987e2d840839b9301f6dd7486eac0b76f3617a7616fa9694b00a8b27e7281a7625c2b289158013897fd13f1b631972fc093260

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  59080c4f2d7a548c13f427670975da7d

                                                  SHA1

                                                  1cd2e8f87156d8a409a33e50dc04e11864c47956

                                                  SHA256

                                                  cb05a58315b64f04e2f48f30b7f68e34689c090cfa69e1274cecf06218a91e8d

                                                  SHA512

                                                  d544a7fba84de04b7662c15ce0fadc9ccc4471954ee4603bff70e4b06596d5015a5f57a7970d5b1f40f34a8a0d8fb0ed115032a9ee551c9318f011a648d329a5

                                                • memory/1420-54-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-75-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-57-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-60-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-62-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-61-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-59-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-63-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-64-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-65-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-66-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-68-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-67-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-69-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-71-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-74-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-73-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-58-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-77-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-76-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-72-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-70-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-55-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-56-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-53-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-50-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-52-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-51-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-49-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-48-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1420-47-0x000001A3734C0000-0x000001A3734D0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/2560-43-0x0000015D676D0000-0x0000015D676D8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2560-11-0x0000015D630E0000-0x0000015D630F0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/2560-27-0x0000015D63310000-0x0000015D63320000-memory.dmp

                                                  Filesize

                                                  64KB