Analysis
-
max time kernel
42s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HorionInjector.exe
Resource
win10v2004-20240221-en
General
-
Target
HorionInjector.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1392040655-2056082574-619088944-1000\{691F4760-E3B0-4480-A25D-D1884D369B39} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3420 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe 1124 HorionInjector.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1124 HorionInjector.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3420 explorer.exe 3420 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1856 1124 HorionInjector.exe 93 PID 1124 wrote to memory of 1856 1124 HorionInjector.exe 93 PID 2208 wrote to memory of 5108 2208 msedge.exe 99 PID 2208 wrote to memory of 5108 2208 msedge.exe 99 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 4720 2208 msedge.exe 100 PID 2208 wrote to memory of 1316 2208 msedge.exe 101 PID 2208 wrote to memory of 1316 2208 msedge.exe 101 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102 PID 2208 wrote to memory of 3596 2208 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\explorer.exeexplorer.exe shell:appsFolder\Microsoft.MinecraftUWP_8wekyb3d8bbwe!App2⤵PID:1856
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa6d6246f8,0x7ffa6d624708,0x7ffa6d6247182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3472 /prefetch:82⤵
- Modifies registry class
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3572 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17940669275846052951,3155525698603292099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD538bcb20750890020c65e78304348064d
SHA133376f7daba3c47208abb53bf8225776694ac519
SHA2560ab199fdc9c1a4d4896dd7dd79ee58eb358eb419059ef538777859836b1a26e1
SHA51210731dda002a51930ffa9f6074a9d12560271aef291e79cfe352626f38ce19162050f07844173d8f0de4fab576d202ccb0efa2d0c6768aea59c60ebc7f0975c7
-
Filesize
410B
MD5902c087beaa2e8553652cc0d7c221ad3
SHA12d4aa1214ec540bc88f25e922f43e89a2704fa56
SHA256c1478e3b8cb7b317d141ed3e7473d934b40d473be49357ee081a626b0556faf8
SHA512d190ba6049b01f1f5517b64ef1d5b33481d6b1f4ac6ef0633d8cdc18ba84a5927bdcf50a032e461a83dadac96e63c542ecfbb5260a742eff13a901b688995e90
-
Filesize
6KB
MD5c9d620cac47aa22b38bdb43c823ac016
SHA15c29555a5cd3630e7f15512912b3b13ba5a1b299
SHA256a780053df716e1bd2a01287222edf9843e5e3d6b8b6ee255c95a710a0206369e
SHA512bbeb636402005dcf60ec91cbdbd0221f0032eaedf7e6d834f641f4dbc3b4d328ad833f93c90d45c249cf2bfd8b68ab9a900be9733451c280fac56b62fa7c0d64
-
Filesize
6KB
MD5c2b5addbce303233d1d2d7e96147ac26
SHA1c861bec1c00c0f368460c6f0445f8a452cb0dfa0
SHA256f47a7794df85b98da5293c1f888a481121aeec15353c76a920a36348a56e6e76
SHA512ed75660e6630d19a65605f9d16e4e73564d290f33e3020e5d491928b93640eeea25a06177fe1c1e77bfd54eb4e4d2c14c20ff8313621be2de0cee9a6e83a012f
-
Filesize
11KB
MD5c446e15cdcc9c847d62e71bad30dce4b
SHA1461fdde6e45d0de13db36bdfea4e89e085ecf6af
SHA256fc362a6d6a90f9b58431fed2ed312aa6856b363e33f9830fd975418357f552ae
SHA5126a2382f77076f008c27cc0bc702cd7daa2bb74e8d0d169f09f1ecb6fc6266b6beaa5b48fbc6143ab01ffca961746bebbd3fabece656b93428e7c6d2272fa8dc1