Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 02:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001DbRhcSnsRZQENkJhpUe2wMzi78WTJcWjdzLfLyZur2YsWmKqlrDzVasCbXwx9QVNY0U9ydWuo9LR48I1oHXaR1kvC15J9kYvqGSSHLTg_zvyzVT24QoEYMtCVFwwYnH-RSmGcj7mSP1Ge7k9EjkVgeaZaWa709f6ifIim2JQLeV4X42fFHmmjOJHVwPH3r7pC99BCYbibidYWbdIVap680mifqgOsdwMbe0PtitVEIwkAuZ0OerflIx8fqzE08FzRKtBGs-6hFUJs7swIJAR37XtmyDWUK5-J1f99fOjmKahhZfIPjfMOguIPsbX_v4jUhcUDUPApFKrU8-GA-3cGbetigctfpdRH9cI4A0IvMdEsiF590bgrfG8G5pgcLnBfcmh6dPm0wboB9hVB13fKjWi517BHbMaZXN_0a-pqTazPDVi6KNPHQuoR5DZbJI-tIzJl6S8KcbxwaGTmWDSPflUiX3O0u1tdELh4xHoLjDnz6g5LOsjvzTuDNusfT-y47AYc5fHEHj6FS4JAt6_Q5Tbzp9Jaz_y0u9nM0dtbA2IrXCpZ8U-Gm6ulqW88wboJX5SmNJzqhnMlHsd4iNPQZR1C-7NwE4rzev7J_SwlSQuDQDjxe0RLF9EKufkQV1nRA1sCHkr2U2w35Z1iTSRcJsys0GCq_u4-tn1Z3mF4ZGZTZBH-bETO9mxyK-kQX7pMsMyQEN32uImLtQQ2p3XD85Ylg_PprfmR6HTXBVBvZ6e_p8PZtkCtiJ4I47NqNPg0biNL_PPQCs=&c=T53HByJOw96RjsviZ4AN2KPXBcM0Isqsicj3qYQkAWkSKGRhTeySNA==&ch=BkbRxjEoOjyxgJHTQCejw_yp5BblDLBEFKRwkLBs1ryHqKVuvjbcwg==
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001DbRhcSnsRZQENkJhpUe2wMzi78WTJcWjdzLfLyZur2YsWmKqlrDzVasCbXwx9QVNY0U9ydWuo9LR48I1oHXaR1kvC15J9kYvqGSSHLTg_zvyzVT24QoEYMtCVFwwYnH-RSmGcj7mSP1Ge7k9EjkVgeaZaWa709f6ifIim2JQLeV4X42fFHmmjOJHVwPH3r7pC99BCYbibidYWbdIVap680mifqgOsdwMbe0PtitVEIwkAuZ0OerflIx8fqzE08FzRKtBGs-6hFUJs7swIJAR37XtmyDWUK5-J1f99fOjmKahhZfIPjfMOguIPsbX_v4jUhcUDUPApFKrU8-GA-3cGbetigctfpdRH9cI4A0IvMdEsiF590bgrfG8G5pgcLnBfcmh6dPm0wboB9hVB13fKjWi517BHbMaZXN_0a-pqTazPDVi6KNPHQuoR5DZbJI-tIzJl6S8KcbxwaGTmWDSPflUiX3O0u1tdELh4xHoLjDnz6g5LOsjvzTuDNusfT-y47AYc5fHEHj6FS4JAt6_Q5Tbzp9Jaz_y0u9nM0dtbA2IrXCpZ8U-Gm6ulqW88wboJX5SmNJzqhnMlHsd4iNPQZR1C-7NwE4rzev7J_SwlSQuDQDjxe0RLF9EKufkQV1nRA1sCHkr2U2w35Z1iTSRcJsys0GCq_u4-tn1Z3mF4ZGZTZBH-bETO9mxyK-kQX7pMsMyQEN32uImLtQQ2p3XD85Ylg_PprfmR6HTXBVBvZ6e_p8PZtkCtiJ4I47NqNPg0biNL_PPQCs=&c=T53HByJOw96RjsviZ4AN2KPXBcM0Isqsicj3qYQkAWkSKGRhTeySNA==&ch=BkbRxjEoOjyxgJHTQCejw_yp5BblDLBEFKRwkLBs1ryHqKVuvjbcwg==
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001DbRhcSnsRZQENkJhpUe2wMzi78WTJcWjdzLfLyZur2YsWmKqlrDzVasCbXwx9QVNY0U9ydWuo9LR48I1oHXaR1kvC15J9kYvqGSSHLTg_zvyzVT24QoEYMtCVFwwYnH-RSmGcj7mSP1Ge7k9EjkVgeaZaWa709f6ifIim2JQLeV4X42fFHmmjOJHVwPH3r7pC99BCYbibidYWbdIVap680mifqgOsdwMbe0PtitVEIwkAuZ0OerflIx8fqzE08FzRKtBGs-6hFUJs7swIJAR37XtmyDWUK5-J1f99fOjmKahhZfIPjfMOguIPsbX_v4jUhcUDUPApFKrU8-GA-3cGbetigctfpdRH9cI4A0IvMdEsiF590bgrfG8G5pgcLnBfcmh6dPm0wboB9hVB13fKjWi517BHbMaZXN_0a-pqTazPDVi6KNPHQuoR5DZbJI-tIzJl6S8KcbxwaGTmWDSPflUiX3O0u1tdELh4xHoLjDnz6g5LOsjvzTuDNusfT-y47AYc5fHEHj6FS4JAt6_Q5Tbzp9Jaz_y0u9nM0dtbA2IrXCpZ8U-Gm6ulqW88wboJX5SmNJzqhnMlHsd4iNPQZR1C-7NwE4rzev7J_SwlSQuDQDjxe0RLF9EKufkQV1nRA1sCHkr2U2w35Z1iTSRcJsys0GCq_u4-tn1Z3mF4ZGZTZBH-bETO9mxyK-kQX7pMsMyQEN32uImLtQQ2p3XD85Ylg_PprfmR6HTXBVBvZ6e_p8PZtkCtiJ4I47NqNPg0biNL_PPQCs=&c=T53HByJOw96RjsviZ4AN2KPXBcM0Isqsicj3qYQkAWkSKGRhTeySNA==&ch=BkbRxjEoOjyxgJHTQCejw_yp5BblDLBEFKRwkLBs1ryHqKVuvjbcwg==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1900 msedge.exe 1900 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 5204 msedge.exe 5204 msedge.exe 5204 msedge.exe 5204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4240 1900 msedge.exe 58 PID 1900 wrote to memory of 4240 1900 msedge.exe 58 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 3452 1900 msedge.exe 90 PID 1900 wrote to memory of 1672 1900 msedge.exe 89 PID 1900 wrote to memory of 1672 1900 msedge.exe 89 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91 PID 1900 wrote to memory of 3492 1900 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://r20.rs6.net/tn.jsp?f=001DbRhcSnsRZQENkJhpUe2wMzi78WTJcWjdzLfLyZur2YsWmKqlrDzVasCbXwx9QVNY0U9ydWuo9LR48I1oHXaR1kvC15J9kYvqGSSHLTg_zvyzVT24QoEYMtCVFwwYnH-RSmGcj7mSP1Ge7k9EjkVgeaZaWa709f6ifIim2JQLeV4X42fFHmmjOJHVwPH3r7pC99BCYbibidYWbdIVap680mifqgOsdwMbe0PtitVEIwkAuZ0OerflIx8fqzE08FzRKtBGs-6hFUJs7swIJAR37XtmyDWUK5-J1f99fOjmKahhZfIPjfMOguIPsbX_v4jUhcUDUPApFKrU8-GA-3cGbetigctfpdRH9cI4A0IvMdEsiF590bgrfG8G5pgcLnBfcmh6dPm0wboB9hVB13fKjWi517BHbMaZXN_0a-pqTazPDVi6KNPHQuoR5DZbJI-tIzJl6S8KcbxwaGTmWDSPflUiX3O0u1tdELh4xHoLjDnz6g5LOsjvzTuDNusfT-y47AYc5fHEHj6FS4JAt6_Q5Tbzp9Jaz_y0u9nM0dtbA2IrXCpZ8U-Gm6ulqW88wboJX5SmNJzqhnMlHsd4iNPQZR1C-7NwE4rzev7J_SwlSQuDQDjxe0RLF9EKufkQV1nRA1sCHkr2U2w35Z1iTSRcJsys0GCq_u4-tn1Z3mF4ZGZTZBH-bETO9mxyK-kQX7pMsMyQEN32uImLtQQ2p3XD85Ylg_PprfmR6HTXBVBvZ6e_p8PZtkCtiJ4I47NqNPg0biNL_PPQCs=&c=T53HByJOw96RjsviZ4AN2KPXBcM0Isqsicj3qYQkAWkSKGRhTeySNA==&ch=BkbRxjEoOjyxgJHTQCejw_yp5BblDLBEFKRwkLBs1ryHqKVuvjbcwg==1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc412446f8,0x7ffc41244708,0x7ffc412447182⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4872924665092017575,5621503837578649358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5793fb6bdeecbeca3e7a4fa622fab039d
SHA1f17f76905ea2f8a58025826a18eb4f884079a4ed
SHA256f7520451e31358321202d7c9caf680ee874c28a8ad6607d49f324e2f8ff290d6
SHA512bd1f28e92ada0853fd0f844d162ad940eb45aa242d7fa8d75770be423a4bd8453915ab0670453100b914fc0a6245a47e231afa46ca91dc7eabbf53f0d2b70199
-
Filesize
2KB
MD5ddf7e71ed971387d11700695158eb583
SHA1877e02d01f08544ca887c0be4140296ac3f0a4b3
SHA2565a0b1cc234b87935ecbe0ad7c6c54bdd5c8317aaa43825e902699b19c50e5f72
SHA512e4ee82f98ae00fa8be6791a8f9528fdcdec9dab62a42667ab380735ad690cd3ddbb9164d19bac189934899f641712db46e7327f98015ba8d308d0dbd97da0d31
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50e254bd3b721b204d1bed89a7e3c4bed
SHA1988f870f17fd11be39ed8189d3f0aeac0d6638ea
SHA256714cf08d8a3d11d40cb46b90b365d0745d46e3d754ef9706b51f5e2a345ab5c7
SHA512a1dc7df3a6a602d68c790771f65ca0b9b4022510cf19e8fd7fa9d46dd674760df4ea3ffc57beed0d7ea657d22a649242daa898dc79052a8ddb714c24e5d80568
-
Filesize
6KB
MD5594ffd4a9d82b63163647a473553e503
SHA1221e2c850f294674b476435cdad979cf427aa505
SHA25633a3394fb223c79d2dd1ff7ef3723c9e8c3c90c1937b5e11fc46069cbbaaea39
SHA5124a34e72e1324232b5dcdf87aa26035e6f3f4dc91ee3b820681777957951b09da990c850a63cf830e33d9e7615acbc01be8f595a0e357fd5ee0843ad0456d320e
-
Filesize
7KB
MD558046db4d043b07fb6b6141966867e84
SHA187bcc25ed14c05eac87a1cad5f91c33bdb403f57
SHA256a2a3b288c1146e6cb296acbad5d4b50fe13544eb6c9f2ab364ca8cc0c78ad824
SHA512bac4439df099e6fa7525524e26013300e076a728cd02109b9ebe375edb8975b6b07754341be0eeacaaae23486dff329936d8798fd230fa2f9a02c142d46bac2a
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
1KB
MD5b3a7ae0c7240a787fb9bfb3826f20a37
SHA11ce007542eab848b248b1ac10fa04da1f4ad13da
SHA2563ac5dc14218df825a53028830275c53ac1305efe97f70093b286164ed0882733
SHA512dc50e8abb42880b954145cbfdf4289ab6ac4c7252e3bf402f43a5d9aea0d0786b6f86e0d3d8777930d7bce5c7a1246412d0d80b1490b2c40a582a013bf07d8ac
-
Filesize
1KB
MD5003efdd8300ae0e5e16511a3256121e2
SHA1b91790a149feebd26869362f0145f75e28cfb8e8
SHA25699bd870e6f89fe5f415c4663af27b86c4199094f19511f5ffe06c384b706ebd9
SHA5126ce0ef5654759412b9b1e6873c787f6efaa1e72ed4f68f071b7c9f3c14cb89be07197a2dcb4a614557bafa18081ca3e2801e964a408849184bd8fe8e7b9aa407
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e6c4f007c0fb2f8c0b30152f30b49070
SHA10e3faeef8208b94829e0c87e38f8986bb581f578
SHA2569fc9065b857e5908702b11f18241f52b4f975a3f7c54a23738529da7e5d29e03
SHA512c538c0df301010351a6068c3ebae2093d986b2d2bd6a7cd2cf836cf6c86d92d5919b7b55779ab04d03bccd1c69970c97769f2a95452fac2ce60a086e0580d3e2
-
Filesize
10KB
MD57766751f3f3ed9c712928fa0d36d881a
SHA17b238c38f7813ca5dd7e69c1d11c4810ee7ea0d6
SHA256535c91bab741ddd2a6527c83ea6991fd3244345bb1f0b90f51702c61a15f4eed
SHA5124e5f4649764e6bf87b32be8cc9331495aa417f5126e93b0b497c0599fd8928f0ad8ecb38cab87393c8fa96d31b8d701fe2cf84697f44cb41fdfbf156650d3dd1