Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 16:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://links.notification.intuit.com/ls/click?upn=u001.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4QKIOIKHUqFsJsp5OQ-2Fs7ZgzQrDjPS-2FjEw-2FzumBOy9SMxGljcnZaFz3WSnmZSK9P-2B-2Fv5BtF7zoEd3kC-2Bdq2jXxISytvvbehtCNrjx9ZOe-2B5iDJjuYyyJB-2BmfyyePoB-2BpU8Uh9n-2FTyh7MaTZmEngGgsXiML1kpw-2BOfQ2N5-2BuUQ6vLdpzrkOQHUkbWVfUiS9sRmg-3D-3D8RBK_liXMc2WMdswVK8QmQ-2FCar42BcbGCpLs3gO9OB-2FB9HIr9mt9w655vj8FsJu-2Bk1pEk2aTYmuVNjhPkKVkjYU8FZTdT52WGFfs8BQ8PWVGknoYN7Dp4VUl43cLwnrdIaNgSzx4q-2B7vYguAp7B6e4JbddfL77lbkKwENwE16paIfJ9i7Sl-2BhvCsExPEHXfLQhnBeU-2FyaZ94jmLxq87sFTHodNiFZqFKPMbbNRxwRujz0JpYxnqw7loweys7CMLDiUoIZocqF9bY8h5CKOFSSI33DGElKkC8wNiTo2tjO3G7Z0pvkkztHVuMSYC0KRswIlQ8IRSetE8bujxMfQ-2BNMS3U3987fwTsdLdYehBbYmE0KF-2F7uTst36ecVMyON6B0MPiOu-2BNcGkVkGECZ5dpk4s8PPT9qrSzlRVBF3ZiAaSGjJw9Je7r3TtIn7P4zWpAv6bVBKzJMHqURex4OTkWDYPNEW2uanavdTiPWTJy0vmpQVIswcN7gbO-2BP4nW3qMHqQJKT-2B9n6sJ6wgoK0cF3gQe31OzSFHvGVX9-2FQCsMY2Bptijhr4lmts0qNlFIG-2FVyMze-2FuU0qVBMWYCVCVQi5hF0QSe0dZltNYnvwxRC3azUniwUVMafLFxthy2i6unIJFSOP3L5eaVFdR7Fo-2F25rqC7-2FrHLmd85I3bqzWf3JxjJKiW2bual0f6ql-2BVVHpxp-2Fh1qtHeH9ECoFcXcbUBTRx4C7Rro06dZH5v3NWL8Rx2qjk-2B-2BMo-3D
Resource
win10v2004-20240226-en
General
-
Target
http://links.notification.intuit.com/ls/click?upn=u001.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4QKIOIKHUqFsJsp5OQ-2Fs7ZgzQrDjPS-2FjEw-2FzumBOy9SMxGljcnZaFz3WSnmZSK9P-2B-2Fv5BtF7zoEd3kC-2Bdq2jXxISytvvbehtCNrjx9ZOe-2B5iDJjuYyyJB-2BmfyyePoB-2BpU8Uh9n-2FTyh7MaTZmEngGgsXiML1kpw-2BOfQ2N5-2BuUQ6vLdpzrkOQHUkbWVfUiS9sRmg-3D-3D8RBK_liXMc2WMdswVK8QmQ-2FCar42BcbGCpLs3gO9OB-2FB9HIr9mt9w655vj8FsJu-2Bk1pEk2aTYmuVNjhPkKVkjYU8FZTdT52WGFfs8BQ8PWVGknoYN7Dp4VUl43cLwnrdIaNgSzx4q-2B7vYguAp7B6e4JbddfL77lbkKwENwE16paIfJ9i7Sl-2BhvCsExPEHXfLQhnBeU-2FyaZ94jmLxq87sFTHodNiFZqFKPMbbNRxwRujz0JpYxnqw7loweys7CMLDiUoIZocqF9bY8h5CKOFSSI33DGElKkC8wNiTo2tjO3G7Z0pvkkztHVuMSYC0KRswIlQ8IRSetE8bujxMfQ-2BNMS3U3987fwTsdLdYehBbYmE0KF-2F7uTst36ecVMyON6B0MPiOu-2BNcGkVkGECZ5dpk4s8PPT9qrSzlRVBF3ZiAaSGjJw9Je7r3TtIn7P4zWpAv6bVBKzJMHqURex4OTkWDYPNEW2uanavdTiPWTJy0vmpQVIswcN7gbO-2BP4nW3qMHqQJKT-2B9n6sJ6wgoK0cF3gQe31OzSFHvGVX9-2FQCsMY2Bptijhr4lmts0qNlFIG-2FVyMze-2FuU0qVBMWYCVCVQi5hF0QSe0dZltNYnvwxRC3azUniwUVMafLFxthy2i6unIJFSOP3L5eaVFdR7Fo-2F25rqC7-2FrHLmd85I3bqzWf3JxjJKiW2bual0f6ql-2BVVHpxp-2Fh1qtHeH9ECoFcXcbUBTRx4C7Rro06dZH5v3NWL8Rx2qjk-2B-2BMo-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-399997616-3400990511-967324271-1000\{102E90E6-8D73-46EA-B383-6539699D96CE} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 868 msedge.exe 868 msedge.exe 3920 msedge.exe 3920 msedge.exe 5540 identity_helper.exe 5540 identity_helper.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 1952 868 msedge.exe 89 PID 868 wrote to memory of 1952 868 msedge.exe 89 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 3232 868 msedge.exe 90 PID 868 wrote to memory of 4092 868 msedge.exe 91 PID 868 wrote to memory of 4092 868 msedge.exe 91 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92 PID 868 wrote to memory of 1404 868 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://links.notification.intuit.com/ls/click?upn=u001.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4QKIOIKHUqFsJsp5OQ-2Fs7ZgzQrDjPS-2FjEw-2FzumBOy9SMxGljcnZaFz3WSnmZSK9P-2B-2Fv5BtF7zoEd3kC-2Bdq2jXxISytvvbehtCNrjx9ZOe-2B5iDJjuYyyJB-2BmfyyePoB-2BpU8Uh9n-2FTyh7MaTZmEngGgsXiML1kpw-2BOfQ2N5-2BuUQ6vLdpzrkOQHUkbWVfUiS9sRmg-3D-3D8RBK_liXMc2WMdswVK8QmQ-2FCar42BcbGCpLs3gO9OB-2FB9HIr9mt9w655vj8FsJu-2Bk1pEk2aTYmuVNjhPkKVkjYU8FZTdT52WGFfs8BQ8PWVGknoYN7Dp4VUl43cLwnrdIaNgSzx4q-2B7vYguAp7B6e4JbddfL77lbkKwENwE16paIfJ9i7Sl-2BhvCsExPEHXfLQhnBeU-2FyaZ94jmLxq87sFTHodNiFZqFKPMbbNRxwRujz0JpYxnqw7loweys7CMLDiUoIZocqF9bY8h5CKOFSSI33DGElKkC8wNiTo2tjO3G7Z0pvkkztHVuMSYC0KRswIlQ8IRSetE8bujxMfQ-2BNMS3U3987fwTsdLdYehBbYmE0KF-2F7uTst36ecVMyON6B0MPiOu-2BNcGkVkGECZ5dpk4s8PPT9qrSzlRVBF3ZiAaSGjJw9Je7r3TtIn7P4zWpAv6bVBKzJMHqURex4OTkWDYPNEW2uanavdTiPWTJy0vmpQVIswcN7gbO-2BP4nW3qMHqQJKT-2B9n6sJ6wgoK0cF3gQe31OzSFHvGVX9-2FQCsMY2Bptijhr4lmts0qNlFIG-2FVyMze-2FuU0qVBMWYCVCVQi5hF0QSe0dZltNYnvwxRC3azUniwUVMafLFxthy2i6unIJFSOP3L5eaVFdR7Fo-2F25rqC7-2FrHLmd85I3bqzWf3JxjJKiW2bual0f6ql-2BVVHpxp-2Fh1qtHeH9ECoFcXcbUBTRx4C7Rro06dZH5v3NWL8Rx2qjk-2B-2BMo-3D1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8633946f8,0x7ff863394708,0x7ff8633947182⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5484 /prefetch:62⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,641872445095998958,12830832350328068757,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1360 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize888B
MD58405069897bd5fd82beeda895a18364e
SHA148ae2a205aa4036d42f317a916c69f28cfd5b4de
SHA256f0d9c6066b976172ad2f110e0a57a2459aa14f13d7ead43e365077120eb83240
SHA512f352f555e9cbeb1f86d9fc096868a380f251a877da62ca060001512cbfbe2f7c9d8677c31b0af4986bd29889583e0c337ee9d023b8b6ad4d0eeeb17084f56411
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5468802a1f2f13fd6043dd0f1a54491a5
SHA1ca819c1ee2329eb2752320a8c9ec395e79a4a5d7
SHA2563f7387c6f4abf1dce958d3b33f3e8e03c19ddfa7fe417e3e1c162052a879de01
SHA51266878c683a3cea3940fafdeab4de93a1562c1845e04741bdfd496ab82ba73f8e3239cb97308dca123c5f3594b3e1d70f43874bd86ae25d7572ebc6b9fd1c94f0
-
Filesize
6KB
MD597976504873a76db3c1517bc578538fa
SHA1f34a0f47b8f6060912e3447d7aac9e9a1b7be471
SHA256473a99f6e21c39a69270a5d9fc7bafc6ee1b0f09aa48a6c551508209e27aabee
SHA5129562b761fb1ae8e08a1e0001fb56157f0cc9c86a82ac86769e3dfcec46e3a4c90683856778f1fa71255cd279c2cd1a657b9c791b3545fd67113fb2ee36d4f17b
-
Filesize
6KB
MD5616ef33102aebc5c305c7b75a7a0f710
SHA14b438c4f4303643542e204d340fcb120f1b24f6d
SHA2565bc3106ea579f7fba03c6c8ab089eaf4a25ca0e41f3b807cbf4af89def50902d
SHA51232dd9e1fa945202ef002130919222057818d1f25d5ddf27bffe63bae591d845d376c2cba6e50462183025628d9c932e4223636fe673ed152bf42112c6bafd38e
-
Filesize
1KB
MD59799b44cb569a3bb99a3e4d45a0eaab5
SHA1920b981d379d70a99f77232db5402b06d30e86f3
SHA256d67c6add81b5b194a899da497f6a8abf0df031abf48482808b381409bf5ecea7
SHA51231019f0c303149616ae3fdb9753f671a7fd6b9d2b8e5e6fc6a7dbaf8b2b477dc6f220824effd7883486b990dfd0c3007824af94ed883b0682b001f8f09afc429
-
Filesize
1KB
MD5ad3a8620df9d5c2c713be291b4a3cfd6
SHA1db4daa7487e5e4ea919bf264b81941dac98a8ff4
SHA256e9dad9f8abdc46335cab751d851c46a6b8a385335a26e15750a69877acbc4b78
SHA5129b0700c1a78c26420834628e43ac43f83d18142e14edbb8534681ca04ec671ca8a42fd84e678b099ccac5933bcdd34c51fcef8d26830f6f2076de2afd94a210a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52bef74449ef3519dade7a08f5c89e9f3
SHA115bb5de8df9ddd63b964f328e5f7aa5bc9a2fe5a
SHA256a5d9da80b8e51c99db57d17bafb28083da7cb505875c3d2a125b6bee470e68d3
SHA5125a3c4800de8cccc37f79b86ceeeacebe38a16da6a66a0a55a30548686e5978b62bed135795a2350cf62ad04ab1cfddc4ab7a83910ea39103e8a514062db3e45e