Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/02/2024, 14:44
240222-r4fslabb7t 422/02/2024, 14:40
240222-r2bqvsbb41 122/02/2024, 14:37
240222-rzm14sbb3y 422/02/2024, 14:34
240222-rxn6dsba9x 422/02/2024, 14:25
240222-rrpjzabd88 122/02/2024, 14:24
240222-rqphksbd59 422/02/2024, 14:21
240222-rphnmsbd24 122/02/2024, 14:18
240222-rmqlgaah4x 521/02/2024, 18:57
240221-xlxlaaeb58 1Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 18:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://j
Resource
win10v2004-20240221-en
General
-
Target
http://j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1414748551-1520717498-2956787782-1000\{18834F26-838F-406D-A3DF-7CE42B4F33C7} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1660 msedge.exe 1660 msedge.exe 4820 identity_helper.exe 4820 identity_helper.exe 1884 msedge.exe 1884 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1576 1660 msedge.exe 84 PID 1660 wrote to memory of 1576 1660 msedge.exe 84 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 4848 1660 msedge.exe 86 PID 1660 wrote to memory of 1976 1660 msedge.exe 85 PID 1660 wrote to memory of 1976 1660 msedge.exe 85 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87 PID 1660 wrote to memory of 4896 1660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://j1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed94846f8,0x7ffed9484708,0x7ffed94847182⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3560 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1132 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,10915443944336286862,4561052011329666455,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f6d41bf10dc1ec1ca4e14d350bbc0b1
SHA17a62b23dc3c19e16930b5108d209c4ec937d7dfb
SHA25635947f71e9cd4bda79e78d028d025dff5fe99c07ea9c767e487ca45d33a5c770
SHA512046d6c2193a89f4b1b7f932730a0fc72e9fc95fbdb5514435a3e2a73415a105e4f6fa7d536ae6b24638a6aa97beb5c8777e03f597bb4bc928fa8b364b7192a13
-
Filesize
152B
MD54254f7a8438af12de575e00b22651d6c
SHA1a3c7bde09221129451a7bb42c1707f64b178e573
SHA2567f55f63c6b77511999eee973415c1f313f81bc0533a36b041820dd4e84f9879b
SHA512e6a3244139cd6e09cef7dab531bff674847c7ca77218bd1f971aa9bf733a253ac311571b8d6a3fe13e13da4f506fec413f3b345a3429e09d7ceb821a7017ec70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5923d91876deea2ed115b74e6f22a3723
SHA10a14f3b5b3533260b60dbb85954b58f8c390c619
SHA2562fc75a1bdef41b17fc0b302d8fb3a0441b4ae30703684da63d9d9efbcfd0a332
SHA512a19503f2ded832565891517df1a2020740d1506ae0dcdf9cdf358b0fb7df9aa8a5b1a646c3c09cad689c43994b5b0bdb35acdbe16711184a205ac4b116b81ada
-
Filesize
798B
MD551481b1ad47567caa1a876f6d5258f56
SHA1c4ce93cc378610b7e1b122aa8e823c5a39f6ab72
SHA2560c468d1d12a126f9cef0d04994bb5b422de40fd1fcc73ddaa1c03da5efe18e83
SHA5124660d349d156f10a81cf9ad07b8a5bdfeb787ea8fd346bde79ea2311cf8a381e495c83e5b110d9f15679202289973eab2937d0a38286adaafa3e06ed3fd694e6
-
Filesize
1KB
MD5c88640210a35d5b04178da8e30eb79e9
SHA1902472f41a922aae50f41dd00cfa62f877b51fd6
SHA256b1248b99f6783b7ed4ecfc3af905edd8d91a67dd74b96c9ade6084929312e0e9
SHA512824514dd13836b2c87a73e769002b1f3c6b24a9c2c4f0aaba7b21f533872810b8b23f192a076b7aaafd964a103126ba75658f73794cc64c61aa2b5de09b1ae28
-
Filesize
6KB
MD5920b32178d8ae32cb6456ca0e01c047e
SHA14f28e08de5365b6b8d655478d6739cda76a8a9dc
SHA256cac7dace02066b5324895f34d69730e4f82d1b920a65236df494e4b4b3676cd6
SHA5127f02f2e26a5018fac47a50b524d0ebf8109b3dbeef2c820d9819d97b2dcc82e6231f13eaa244c7350321a9efdeb2a8d85cce67b14bb7b380198ac774aa489751
-
Filesize
6KB
MD5f1cef271202de457db61c44a7d7166c6
SHA1c4e809971a2e5e7a59009ebb8056d16dd3de2682
SHA256cadf3301477efcdb8afbb53f70e0325e7efbd457880eabfaff5199cff8d1ae91
SHA512f34a445d1567c77e88b177f9345165269093d28ede44686fe84a8600f7431ea41813215cea91a691840e82005ba92bddd47895b25f2d0a9068eec6036243ba0e
-
Filesize
6KB
MD55bfcd853cbd5865a8847e8af85739954
SHA132ae3f478eb442b05373b1db1a63e268c9b54d6c
SHA256964aad4be634d3e37c44594731f336b06ad0663db13fdb389faca95a83099d51
SHA51280afad9e47f47957526d89624e3426a6c20b86001099d9aec925c10c733c22cf69c5c0f3ac122042685201613cb793e6022f91fae9663b2c92a1172c31c4d122
-
Filesize
6KB
MD5b4bb8160872c75dac7a5ec18b70c5e6a
SHA1210abdc68d4275fa45b76dc93431d1ae0324bbb9
SHA256a34edb163cfad3bfe28aea4491429d3a7df5e361ce0817f59fb1337bf035da78
SHA51266aa5a70222faf7094fb16b31068221c1f31872b01072ea5aeb2a0de64e2e31fa79e027a5bc78352126f8c1ae0d01d25ad99f13fd725f2e303582f635dabf72d
-
Filesize
7KB
MD553e61dfd2be624639197e8c16214a718
SHA11dc11775a495ea9568bc7f8d74eeec747925e63c
SHA256aac17e22c93cb5b72dd9037194357e8654c1fe52387aab8ff01aedcf6e4ccd4d
SHA512fb3b3860ef97d3dd9b2cb9de3454e5ad95dcaa1dc19a62e6cd4e36009955681e6deb20e581777238bb64aaacdb0fe68613cc1d639705f13e63987879c13a5137
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55c7a07550043688f7b6047a06be741e7
SHA156bca1853a939648959a028ad72d4ae51f02ae04
SHA2561577cf4996269cd9b8a675ad0ac818d22da7c79383e4743f8c390d307d784ac4
SHA512ffe874f8f3895d6e8480597e62e90cbed38b59a8fba666d7da394c4ed2ec5658d3f6c23996fd9b0360e68b622d55356fdd0239e2d3ea5886956a14a6c48048af