Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/02/2024, 15:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbDNnMWs0XzNqM0NBZXhfTFAtMUdCVjlZWllTZ3xBQ3Jtc0tsTXRWNEp3NDFOTk9hTFh3R3RCckVJRk1WdnM2aklsdW9MdVppd2VHeG5IRmJjMFJ0a3hVQy12Xy03elNyUkZTOGdiQVVGTVdwZUFHWHp4eDZXdTRZclNQcXNYSm51TlpBeXpSb05nX2V3TDQzUEJyRQ&q=https%3A%2F%2Fmega.nz%2Ffile%2FWlNE2RAY%232h76Q1ZrXDhzSYu2ufrHT1-q5ZMPQf4h2LFDFWWOryc&v=ES9Pi7CrofM
Resource
win11-20231215-en
General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbDNnMWs0XzNqM0NBZXhfTFAtMUdCVjlZWllTZ3xBQ3Jtc0tsTXRWNEp3NDFOTk9hTFh3R3RCckVJRk1WdnM2aklsdW9MdVppd2VHeG5IRmJjMFJ0a3hVQy12Xy03elNyUkZTOGdiQVVGTVdwZUFHWHp4eDZXdTRZclNQcXNYSm51TlpBeXpSb05nX2V3TDQzUEJyRQ&q=https%3A%2F%2Fmega.nz%2Ffile%2FWlNE2RAY%232h76Q1ZrXDhzSYu2ufrHT1-q5ZMPQf4h2LFDFWWOryc&v=ES9Pi7CrofM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133514471863469612" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 40176.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 3664 msedge.exe 3664 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 3984 msedge.exe 3984 msedge.exe 644 chrome.exe 644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 5004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5004 AUDIODG.EXE Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2276 3664 msedge.exe 78 PID 3664 wrote to memory of 2276 3664 msedge.exe 78 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 2460 3664 msedge.exe 79 PID 3664 wrote to memory of 4288 3664 msedge.exe 80 PID 3664 wrote to memory of 4288 3664 msedge.exe 80 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82 PID 3664 wrote to memory of 4968 3664 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbDNnMWs0XzNqM0NBZXhfTFAtMUdCVjlZWllTZ3xBQ3Jtc0tsTXRWNEp3NDFOTk9hTFh3R3RCckVJRk1WdnM2aklsdW9MdVppd2VHeG5IRmJjMFJ0a3hVQy12Xy03elNyUkZTOGdiQVVGTVdwZUFHWHp4eDZXdTRZclNQcXNYSm51TlpBeXpSb05nX2V3TDQzUEJyRQ&q=https%3A%2F%2Fmega.nz%2Ffile%2FWlNE2RAY%232h76Q1ZrXDhzSYu2ufrHT1-q5ZMPQf4h2LFDFWWOryc&v=ES9Pi7CrofM1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcbfca3cb8,0x7ffcbfca3cc8,0x7ffcbfca3cd82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1848 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10814922328339679003,3129996305567987556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:3400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004E81⤵
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xec,0x10c,0x7ffcbf3d9758,0x7ffcbf3d9768,0x7ffcbf3d97782⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:22⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:12⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:12⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4688 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4832 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1832,i,17261159737887732134,4135753354654130309,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bc4b43cb67768525468d9c6daed125e4
SHA1f0ab611a50e83c89e58f6b5350f3b676f2805c26
SHA2562243bb802651675f27e6948433c50dbb4f96587db13548fac5566a5f15d0c27f
SHA5129815eb7fe6debd70822c7b0d8a0f32eadb12672dd7bfe86ece0a6023cb8e75f0a3c1c8364ce9ca60f34022eeb1e7be7c1de3fe53241af96e3f8f24fd698dfefe
-
Filesize
371B
MD5a49a1feea6ab13a4b2d03dc000ded10e
SHA14c0a1d42666c08542269f3cea9315dea785467ac
SHA256ab71a545064c2cb56d3d8af5dc78cf12990c78c1299f34c9d4b81cb869f7296f
SHA51233ac2ea29e091eea41b009bd07929bc40be8c49709c33d5bbca0405b38800e26d2d99e81b207479d09fa0efd3dc7ae495034b6672f79cc104a065ba9cb614ca7
-
Filesize
6KB
MD5eb14498e987e9ecb91494f040bf28615
SHA1aeec45b7bc44f181a4c254d10228d0beaa5c1fd8
SHA256ec59de8480508ed91b51e9ca8ce4b0bf9c60448d3d71d8522582335ad40dbcaa
SHA5128b9c24e210a691f259ca72d7015e94101ce40e53fdc85b24a7e26bdeac6aa86695ae9bf29aef95fbcfb605322c580d55595146114dd5a44aa37691083cde9c3c
-
Filesize
6KB
MD5a9909b600a67593132562e6b496070c0
SHA1316cb844bed4b2f62ab7c18ae404803141e38352
SHA256efe7767b6abc91b50a5b9e6c84bdeaaa8ae4beb902e0c6402987f93426ffc2a4
SHA51216c348cf7e2bad87bf6f140b5509372c27a2f46071f164f2dfe3396655ef38c8fe6365c2135200d4cdd48a5863d5f47d5485acfa4ddfef6e5e3eb8be42ec5561
-
Filesize
15KB
MD58280d8e799274fb4a611c584fb272895
SHA1619e5ef5e6574e0094e4f6c7892cf2b62df3cb11
SHA256982f730482601c0282667a646ddfc248c06c7ce863d91dfdb7f628905cb763d1
SHA512607c7688eb1f2ccce0d890d8d1a8f26751b47a6ad488a0a696dc4e77d6887b9ce55682e0e17cb134677890c4c0160f9be3d290965cd96505d77b23f2adb9ca12
-
Filesize
233KB
MD568bf1c8e64b0a8e796b0263ba1192c34
SHA1f15e31aee8378972d1b175c3237ac0ceda8dc3bf
SHA256c1b88aafc1d5d5bda59d6ec4aaf3160036e9b6cf33e1b4118023313c32b7a679
SHA5124c92fda169ba579a6e5748a476035b704833dd50ccb509a0041165a6ad65d6060f604b26b6534a589d21212f54628e2ea2ed257e4de20c54689644b7535f8b5a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD592e040d7c1eeb7646714b53e4a95eb91
SHA14eaae5706d13b5f0ca9f2e4c994cfca63890dd7d
SHA2565342d5a6f08451e0f1c54f8e3658dd91eeba2be804f3582ddf8d6a4e2d0c6468
SHA512e5b4c0ee79b7536679bf2e54f865f91b4957d4f66e498a026b88a6c14a13163f897f54baa9da747c1523eaf20d29cca960b8949a08a7b0ab9b0bbe92478a34f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5600a2cbe2b4ca3b96c38c50165609ab2
SHA1dbdc58f58aed04485f871a571b1b18db25dab688
SHA2563972ddb8b2d2cd36fee0e28b5cf30c375e462758529879a258483ee4a6485e9f
SHA51239ed42868e584c7080c61ffc406744f2b47eb50741345d5ee33f3c008ea2d3a7ae0def4def8f93bf212f7a6c53681f36b5cf779e1df51058001677b6ce4ff88f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
666B
MD526f1555b2878f856a7bffb35432a2e98
SHA1bc838ee887775c17d4207126823ce5fb6e469bb0
SHA256118733f529fc2cc69d676c89b073853b037151a79ec85c6be94d05fa3591f13e
SHA512bdaa6af20f602e50d63c1aace8f13567bb0c139df6306fe59f93d563030b7757a9e8e3ac5b1be5227ba9ad333225948589de2fdc299bbdb1ee8222c403d5970a
-
Filesize
4KB
MD51ddf363ae5c6104cab0876cdc27a7975
SHA1a34a204db2bd64e18563e40a3d4ce5c2a2823bee
SHA256a43b352b5b1066a5cbabb5052860d259244671fdac1c838e49e2e0278e5644b8
SHA512e4277746bfb250ef093d33b4670587e513c028cd1fb396b5825d2ea86857b3a2c65f0188afb802458c05f6e9b01fbc2a1c422322f82b94f6d3bec85a6c213e04
-
Filesize
5KB
MD5dbb98cbc6a70a50d0d5369a2b6bdf07a
SHA13f1b4315ed379e953fd72009adf51b99df555d24
SHA25664234d2e935c99d0414fc1f33adeda699cf0aecb0da9b497b45111478fd710d8
SHA51245602edac53f259f953b2e00e7613f60ba674e92e446aaafbcb40860692b2ad8c50e958408d2ef58a6d6512be2cabe25900debd69496baeb36b43ab2662c2063
-
Filesize
6KB
MD5fc05f44c0c8bccfb901a52210ccac38f
SHA1f597a3086dbefab606e9eb09361ff575a15d330a
SHA2560bf424ae3039004a3a3bf91933b011c7604c72c0e297907c6cd406c2b64f0662
SHA5123854bc3a5c5b90f96b952dad052347fccee5086974b17c932c2983c9712b69a21a57134c8ee442ba64e12d3009a83805f8f1d7593633360cc18d2030a51100b0
-
Filesize
25KB
MD558e2b179dbb10d049fe23616966bfb2a
SHA1b4f722b7e798fb6347837b51b05a4314a8219d84
SHA256cb934e662ce5441a1fec40f63ddb8b828d7cf0f4a532712907064b377d2777c4
SHA512ef3fbdd259151b0695369fae632106d190d2b9ac20b9854c5d2c23359ffde9469ea1736e7079264fd739ef3a214ac6ac8dbb9ab6c49184e5b5ebf9b8341c0c9b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ec1fa8539dae2f28906ae589602e21d0
SHA13dec9e52b80e38497c2024972e7001f57dd89930
SHA256269721226abc65fd59f9fb5ed581b223bc034fa4ea3cc3dd4d21593c4ddb8c73
SHA5125283f2e3e84fe75d59656ddef3cc6bb2dbe1bf5b66e9036fd6eb31fc107d36c5eca09149d2421d383e8ce7ecd6c35c2e11e509a4bf9fe47ce218639a40096e2a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5812f6.TMP
Filesize48B
MD5f5e8819bfea696f025514a90ccd12053
SHA1c15177dd83c09c7722a2f2825c73994cfe34adb6
SHA256a3dbc8ae4939707ff9ff4c9c747f4de20f41849a3f9ffcc21285ddc18d15d5c1
SHA51278040de6e749b6b89cedf022a4ebf38442a622e0ac2c1e38b2a10fd52a86d4e6b0ef1664246605dc119e3bc68c7cb35a6a8a5601297f7c41c1415eeb2dae7115
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54d1aa3fff7a74b34cf5a6b4e54daaf1c
SHA14cbb76dd3bac3a12445fee61ebed99dfda1db215
SHA256d990e9b650ae3bacd987750f1bf0c235ba1a6e4a23b42c83809d8a7048fa309b
SHA512feff1c3c5e5679ba23df06963ea0077532be80c5895f209d61c0e06782b052cc9fa5d71b895b26d81bbf0522a7e941a408a6a1baf6ae7c7efae4112d569b54de
-
Filesize
10KB
MD5bf3a2d534086936fb488a4b1d2c005d3
SHA1db3235dba0286b2b21ca3fd05277031630cb23c4
SHA256e6d95b200afe2347d47dd270d37cde2df7d9a892943bbe752525681f3a9389f8
SHA5126e955ffc3e2cf8eb6761cffd9e0553c062a3fdbf86daa01d2b9010edd1a8d0a206bd61f7f094bc69a66bd5efbe6af5f7ac5177940615413fceeb9da6b91795d2