Overview
overview
7Static
static
7Danger/Danger.exe
windows7-x64
3Danger/Danger.exe
windows10-2004-x64
3Danger/Danger.exe.lnk
windows7-x64
3Danger/Danger.exe.lnk
windows10-2004-x64
7Danger/cmdbkg.exe
windows7-x64
1Danger/cmdbkg.exe
windows10-2004-x64
1cmdbkg.exe
windows7-x64
1cmdbkg.exe
windows10-2004-x64
1makeall.bat
windows7-x64
1makeall.bat
windows10-2004-x64
1Danger/makeall.bat
windows7-x64
1Danger/makeall.bat
windows10-2004-x64
1Danger/nmap.exe
windows7-x64
4Danger/nmap.exe
windows10-2004-x64
4$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...71.exe
windows7-x64
4$PLUGINSDI...71.exe
windows10-2004-x64
4$PLUGINSDI...86.exe
windows7-x64
7$PLUGINSDI...86.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
4Uninstall.exe
windows10-2004-x64
4ncat.exe
windows7-x64
1ncat.exe
windows10-2004-x64
1ndiff.exe
windows7-x64
1ndiff.exe
windows10-2004-x64
1nmap.exe
windows7-x64
1nmap.exe
windows10-2004-x64
1nping.exe
windows7-x64
1nping.exe
windows10-2004-x64
1nse_main.js
windows7-x64
1nse_main.js
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2024 12:40
Behavioral task
behavioral1
Sample
Danger/Danger.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Danger/Danger.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Danger/Danger.exe.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Danger/Danger.exe.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Danger/cmdbkg.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Danger/cmdbkg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
cmdbkg.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
cmdbkg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
makeall.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
makeall.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Danger/makeall.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Danger/makeall.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Danger/nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Danger/nmap.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/npcap-1.71.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/npcap-1.71.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ncat.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ncat.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
ndiff.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
ndiff.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
nmap.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
nping.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
nping.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
nse_main.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nse_main.js
Resource
win10v2004-20240226-en
General
-
Target
Danger/Danger.exe
-
Size
93KB
-
MD5
5bbe037d7194508d83c28a01bf2dcf85
-
SHA1
ef36d69adb37bcb057e2b8982d0155cb147703a7
-
SHA256
237e4dba5a854dbc405369faa5290c2c5e238eebe9a78da1ab61e07332a44e22
-
SHA512
d00532b03a998d42f2f80bf9c5cf51fce4af14eb22501f25fb24061a9589ab4efcb2a7977317197fbda3f313d738b889f17c43147dbc16322f08662b153ca4e3
-
SSDEEP
1536:37fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfew9/gOm:r7DhdC6kzWypvaQ0FxyNTBfe+i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1904519900-954640453-4250331663-1000\{AE0E41F2-A4D9-4454-8F1C-06D624890F05} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 cmdbkg.exe 3300 cmdbkg.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3564 1304 Danger.exe 97 PID 1304 wrote to memory of 3564 1304 Danger.exe 97 PID 3564 wrote to memory of 376 3564 cmd.exe 98 PID 3564 wrote to memory of 376 3564 cmd.exe 98 PID 3564 wrote to memory of 2480 3564 cmd.exe 99 PID 3564 wrote to memory of 2480 3564 cmd.exe 99 PID 3564 wrote to memory of 2480 3564 cmd.exe 99 PID 2480 wrote to memory of 3300 2480 cmdbkg.exe 100 PID 2480 wrote to memory of 3300 2480 cmdbkg.exe 100 PID 2480 wrote to memory of 3300 2480 cmdbkg.exe 100 PID 3564 wrote to memory of 840 3564 cmd.exe 104 PID 3564 wrote to memory of 840 3564 cmd.exe 104 PID 3564 wrote to memory of 3668 3564 cmd.exe 112 PID 3564 wrote to memory of 3668 3564 cmd.exe 112 PID 3564 wrote to memory of 3120 3564 cmd.exe 115 PID 3564 wrote to memory of 3120 3564 cmd.exe 115 PID 3564 wrote to memory of 5048 3564 cmd.exe 116 PID 3564 wrote to memory of 5048 3564 cmd.exe 116 PID 5048 wrote to memory of 4656 5048 msedge.exe 117 PID 5048 wrote to memory of 4656 5048 msedge.exe 117 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118 PID 5048 wrote to memory of 4912 5048 msedge.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\75FB.tmp\760C.tmp\760D.bat C:\Users\Admin\AppData\Local\Temp\Danger\Danger.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\Danger\cmdbkg.execmdbkg anon.jpg /t 30 /c /b3⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Danger\cmdbkg.execmdbkg anon.jpg /t 30 /c /b4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.stressthem.to/register3⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.stressthem.to/register3⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.stressthem.to/register3⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://md5decrypt.net/en/#answer3⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x2a8,0x394,0x398,0x2a0,0x3fc,0x7ffecb512e98,0x7ffecb512ea4,0x7ffecb512eb04⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2356 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:24⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3100 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:34⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3160 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3476 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:14⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3524 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:14⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4932 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:14⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4736 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:14⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5308 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5392 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --mojo-platform-channel-handle=5508 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6000 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6000 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --pdf-upsell-enabled --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5864 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:14⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6068 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5224 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5156 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6056 --field-trial-handle=2372,i,1471568941368236081,11325934555769451191,262144 --variations-seed-version /prefetch:84⤵PID:5200
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4688 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:11⤵PID:668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4104 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:11⤵PID:4160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5836 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:81⤵PID:3656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4056 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:11⤵PID:3372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5636 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:11⤵PID:2092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5968 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:11⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD557fe0421d631964b8ea7ce4f1ddeaa2b
SHA1d782b6b70bba98c406cd8fd72783092dc727a53d
SHA256c066ec597e5fa41d56ac06636e7956c98be95ed853b5c7049b5f029f23075bd6
SHA512ba0f4ba395ef5eaa00615cd70240e610fc5c48cc936c57cddf0905e80f156ad7d236d92263b82e1e2331494994a6fd3b54f8de6264185890be01eefabed6769e
-
Filesize
280B
MD58a6b4f4df68dd846dce2ca0043a78e6c
SHA1961366232c37096d2b728b5d82cc77a1568386ca
SHA2566444531d7e70be9183e1db22749aaaeff07bbd56f636eee20fa9e4807ad40219
SHA5128062f27570e422b4f2b1bb700a68462e61e885a0954e4a978a79207eabab60dd6770c485974c7ce8321e76dc5b19ab6eb266baf43eeb364599258efd25b1100a
-
Filesize
195KB
MD589d79dbf26a3c2e22ddd95766fe3173d
SHA1f38fd066eef4cf4e72a934548eafb5f6abb00b53
SHA256367ef9ec8dc07f84fed51cac5c75dc1ac87688bbf8f5da8e17655e7917bd7b69
SHA512ab7ce168e6f59e2250b82ec62857c2f2b08e5a548de85ac82177ac550729287ead40382a7c8a92fbce7f53b106d199b1c8adbb770e47287fc70ea0ea858faba6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize936B
MD5edb177a558a46ecab8b18120dcf179a4
SHA15778246bb0bfa3bed4398e7836b74917261b48d0
SHA25651f96b68dea929fe63d1cd1c6b9fb579dc1562a26cf04164aeb3c998526a589e
SHA512cfea7a309957d2a678839c6868d971d1b387a6a53ad68a94b7b9d67abfdefb15372804be263a8fa0ee93f1b0f57474ba269bd4e01b0c1403cfb7eb62cf3c6890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe586cde.TMP
Filesize312B
MD583554860be80669f6fe97a4e476e9e31
SHA1c1c64808dd7bfdc2fccf9ca544487c5c395b195c
SHA2561c11e2586fdd717258b9c7adf21ce68ede399764d95ebe9a5683beb50a325299
SHA512d368048acadaeaf43ee49fa0c04f78229bd612f8bd38e71d47394381840f9d75803d518b62d71b001f5b5dba131e3673d29dfebf84f578d3e4e19b4eca8f7882
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
7KB
MD5ad61289e97ed41dd5f6bed4d530b99d0
SHA1c0970204b74fff6e468e36c3a04bfe0d8668abed
SHA2564c011cd9771e18657b89536ddc27689aec5c34e20b5416e67d4b0682a5395600
SHA512eb943618604fdef3568488f5fe31e7389aeebac88b097933b5342b90aa6c930228eac0f904411694088fe80abc3d4fa9d07ffdfbefbb68ec7b0bfdd51409f821
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
858B
MD52dc6692aabe5252a7e9b73cfd48a6f8d
SHA1da6c78c7ff49607f0eff4b3b0759b5b56868f679
SHA256919d9bf9d5ddd946d79f8e05913a4772c8a5385a9347897cf4fca9e7c31d55cb
SHA512103b7ae097d71797a45008a82a15e18cb8d42e9d231f7bc07bdf4745297fddd9a49d5992fd0823b8642da61ee14795b883ed22c2ea59029530444182ef9aa02d
-
Filesize
11KB
MD5d4f57361e5072b8872f17c9771ac83dc
SHA12d74e821dced6917403199dbec7d7ca3afb6b009
SHA25664db3d5b062eeda991ea83f1846b9d8e5a00a1785914fb1920f1059a25c932f1
SHA51223a608d94459a94ecf0097c0603bf0c408219baf1f4977b167cc48cfe97a5c2b3cf2204036b65aa95e0f01900a0a50c27c2cc7a12b702e5bffc226e0808754ac
-
Filesize
30KB
MD599767e4947a9c8f08fdef54ae98974e6
SHA17ac3b5e273e05908f25dad83808e63313566ba17
SHA25699489730d3c0bce15677cd8c0b14765cc808dd6d6a587d81859442287941ce0f
SHA512784bdc08bca63687a943808cd494c5ef53f0cc37d0d8660daabe5aa835b1dda258c367a5446a0f0ac690fe513e3f46d817bff9dbbd4ead6a0d0b23c4cc4ed7d7
-
Filesize
37KB
MD5738b0ffb394b8b9f9107388d7c608a40
SHA179187ae258dcefcd6edf4cbbc84e3bf83158be36
SHA256634ae90ce3673ee83cd246b0ae0e09c1707ed2fa8b4f6a68a101b400327fb497
SHA512a033cad97d2b5be691bfbafd758ad9ba40fa47c2a6f48a0affa87500a198c610ae8348f0e8d3596983543513b0483097f0b1487735ca8dd3864e65f78222f0fc
-
Filesize
46KB
MD5ab9d0b66dba3eb5303e5f9d473d35ab2
SHA14c71a647a4a7099c4fd21f8b709b32fab4e211e6
SHA256e110e2a1c4c3cc8ddd7709b92d1c20c4a456e06870fd0d3b9970bbbcd3f04bcb
SHA51275edd286bd1a78cc9480d455d599166db8e7adea78ab08229e9babbeaf477491d27070e4fe9ce1beb1d4188497bb0c504953b17bb6d1a243d434bbd7c339291c
-
Filesize
9B
MD5b6f7a6b03164d4bf8e3531a5cf721d30
SHA1a2134120d4712c7c629cdceef9de6d6e48ca13fa
SHA2563d6f3f8f1456d7ce78dd9dfa8187318b38e731a658e513f561ee178766e74d39
SHA5124b473f45a5d45d420483ea1d9e93047794884f26781bbfe5370a554d260e80ad462e7eeb74d16025774935c3a80cbb2fd1293941ee3d7b64045b791b365f2b63
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5a212d8d755bf41b4e284f2ea672c9d00
SHA159926821a5e34ca4a5920ed89050cdb12ef938d5
SHA256ace7454fa4914f9bdfdc263ac94325367764b898211c35b7c4ef221ac71bc861
SHA512e1444d6c6be1ad95eb07d6ba50eeb2c644dfcb137b0a0081c94a17698514c9728c7ce637ee2a59eb47cb5c5c7b922c4bb971612ef0fd2131b56512f3195e228a
-
Filesize
2KB
MD52d65b6e5544d98e77b8091cd73ae1843
SHA1c4670cf1876484ab2df8059608248cec20e37152
SHA2560a8248ff4b5a2f17babd05dfc19d7f6333d1e58e9996308ae08064b90827d0a5
SHA512a40b507bf4c5b3d4a5f0eebc1c1b0d652d63dc674890caf06c389f6a1427a4ba3a22f3a62d3dd8874e0aac7aa890a31cf76198b7caa0e7d78bb150af39182943