Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/04/2024, 19:04
240410-xrc4tsca3w 710/04/2024, 18:53
240410-xjnwcsbf7t 710/04/2024, 18:50
240410-xhb56sbf21 110/04/2024, 18:40
240410-xbpspabd2s 1010/04/2024, 18:37
240410-w9s3bsgb72 810/04/2024, 18:27
240410-w3qzdsba5v 410/04/2024, 18:24
240410-w15d1afh52 110/04/2024, 18:13
240410-wtrjkaff78 110/04/2024, 18:07
240410-wqcw1aaf4x 6Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win11-20240214-en
General
-
Target
sample.html
-
Size
18KB
-
MD5
975aed651740cac29bc0fa6e3992d3cc
-
SHA1
42033f32c97b6be4e446c0a77690745eafc28112
-
SHA256
c7a53cef7508f2abb86996be29a075c2ea63bf09b1bb08e1b1b7a592cf074e60
-
SHA512
53a57fbf3952c5f0e08781879747d059d27a81f58c3f1a9f38c8763ba7aa8d31849e9797092c7624311b626e9aedd4937956bdefc54350ade3d480b04d1eb87d
-
SSDEEP
384:rTqN2DpmReVoOs41N9ylKeGM+U8HhhbG167uS2LjFrSE3+dVJCBXQL:rTqYBVoOs41ryI1M0Bhb68CFrSEMJQQL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2567984660-2719943099-2683635618-1000\{9AAB8053-50BA-4216-91B1-1A5B0BC5D27B} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 4896 msedge.exe 4896 msedge.exe 1044 msedge.exe 1044 msedge.exe 232 identity_helper.exe 232 identity_helper.exe 1520 msedge.exe 1520 msedge.exe 872 msedge.exe 872 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4556 4896 msedge.exe 77 PID 4896 wrote to memory of 4556 4896 msedge.exe 77 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3440 4896 msedge.exe 78 PID 4896 wrote to memory of 3680 4896 msedge.exe 79 PID 4896 wrote to memory of 3680 4896 msedge.exe 79 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80 PID 4896 wrote to memory of 4772 4896 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0x48,0x10c,0x7ffb36d63cb8,0x7ffb36d63cc8,0x7ffb36d63cd82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3008 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3468 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6744 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7008 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,13878561984564580628,16649203979070352167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ec7568123e3bee98a389e115698dffeb
SHA11542627dbcbaf7d93fcadb771191f18c2248238c
SHA2565b5e61fe004e83477411dd2b6194e90591d36f2f145cc3b4faa20cf7ae266a75
SHA5124a53fbbd7281a1a391f0040f6ff5515cedf6e1f97f2dae4ab495b4f76eb4f929dcda6b347f9bf7f66a899330f8897e1ed117314945d1de27b035cc170fa447d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD547d056c133411f3c7edf01ccd915238f
SHA1894547730837220ffd07efaf7ad0e0e9579a2847
SHA25635290651c4b8d10f7b33400570fb4143bd409b04f7dbeb15dfbc656435d7b0b6
SHA512fbb776d8218df02e05f674cc62e6c767b9927f38eb6df956b508995d908257fdbd6192d79776fee5538f501bdfe6d1cf90d786cc1d4b5734d2dda66b5a31377d
-
Filesize
1KB
MD5f4685edbe5c8a88bfa5c9df0d3a283cd
SHA139de12654c1b86332a16b5fb4d01d2174c38cdd5
SHA2568b35ce65f76f410bbef2f3da60542b6e3e3065e79e7ca1d338142097835e6b07
SHA512321b48c12385074ce9e71f6e05b3b657c90bf642a3ac221ab792ccdb3a9fa13fca7c398b43d81662de0dea8081c2a476dad5bea7a6dc9b8660fc776f329c34bb
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
4KB
MD57a49a252f3e4cdab9a0b979da3111b10
SHA145bcb07f3ff9deb2a47c4f4d9a79781ddaf44906
SHA25660d1525a932ad48ae4452671eb11512184128c90a9260b3ff132b857ce1e61ea
SHA5122ceb58e01e6e60c899bf3fcbc62d508eea7ff82d3f1eeea7a7c98776f2281838ccea640c3abcb5e1a77fb83bb1b9650a8004467ddfdc0ddf2734583b586ccf17
-
Filesize
5KB
MD5eda65f8514f749421e74b1e8155e328a
SHA1d35fe25cd87aff5aa84c4a00415218d9b0cf42c6
SHA2567a586150a0c7933e258de39d750f804151d8b00728225c5ad71e7cbbc1e14207
SHA51206db0dcfad80a6569aa0d59c393d3eb83fa7255d2b74ff8f4fb6f9b9fc9acad37dbbb4476d14e052c0a26b355dcc2af97770e32882e5805d4f19da09ceea4b40
-
Filesize
5KB
MD559820781e60e0797722e6bd2b70ead90
SHA100ae7c12135290cdae08918a112c4311ee26135a
SHA25676ab6414eac0b4d64d4dde3bbd54bc9b2da4f34b115989abe7bc9a3b4e7e9c4c
SHA512fea4e7dcb80e3c6e06e54e9b030db11ba2280bd76735186b01bf7b24f4243140bfc48a375d758f05fc1c22589cee1150801e29c89b0a1e00913b1d797d153c91
-
Filesize
5KB
MD595cf28669d51fa40bc1e689da2768141
SHA11d138b0d1e5c23c19242bf96031aed57de2b08a4
SHA256f2747dacae34aa3315a7fb02579965050e106b9a45a53871efb3c64a945f4ad2
SHA51292730afba273d23980c07622b9863922fbf9fba769223b791c1e1e0c8c24f5c56b89dcd5f4735cec7855d5305b00f4781c248a637503c4556b11ca1d3fa9480a
-
Filesize
5KB
MD560e8f8efa3970ce7d711b441062e2b5d
SHA1097d33b99bee0230a6a3c2658239309ab4bb9d1b
SHA256a9b326997a405a97439e02ead666f8bde8fd16667af16eeeaa6d62d16d0dae0e
SHA51239a960119e4d95a7dadbe5c9e4f4261a47a45f73552a8517d5fc73b4f5d7a71f271908fbfc44ae68134a332a0a5b49304c09b7202f267158fe6e5f60b05b2181
-
Filesize
5KB
MD5fd79f1b064d5ec02cbcecaae15765e43
SHA1efc061b555740b076fdc3bf9e3627e1e127ad151
SHA2566889837eecfadd9c767a7589fe233eed4ea82af221ce7f04360548695a5aedc0
SHA512a4d1a8823cbb7bd28ed982dc873cb0e1789b706a3835e0d884db52be80bb5566d3ee3c04ffc1f10b419f263402f2f5af7e7636b49580345bb71e9732cdd13e26
-
Filesize
25KB
MD50ba15f72ffb0a37243558588d3e78221
SHA1814bdfffd723f7de9f8d6d6a0bc8d85a9f275cc0
SHA2563d0223e1f8bb35870db41872cfbbe467f65bf9a1208dcb4d4ad874e250ccc10a
SHA51202b168ef9cc226a08955092173c3745a55b28faa438b8152acb90d3bc1d9f433de7d8341def8b452db1986392a59cabc7c69689ad00825c58371ca78021183be
-
Filesize
1KB
MD5556a3b1964143e19ab828884eb9e9fb2
SHA187b0e31b8d5a3f94d438be287cc713a4aaa0a3dc
SHA2560b6dda68a006b4400d1abcc824afb87a6fbce2c5c8588b32815346b717f6a9d4
SHA5128d9df78d850bf0b6e4c7d16d82c42c9dad0f01fd33826a470fd42db4b904252487cb03e7a088d32f457f800414b020aac776cf8e796b1340b6439de41e23a496
-
Filesize
1KB
MD50a02d53b68ee2e96ade8826ae069285e
SHA1125349a6808f19bb0dade8f3c6893da25ae11b3b
SHA2563b2c29fa9d9fb5349420b0900c3c7498fbf4544a5a35e63220dca525576f8b31
SHA512480ccf67fa2191a69ccf66b6b00e96ad0400b65c65913d43a0e9dae1c587fff29572b697a6ab704cf1e5482c7a117e47ae2b2aabfd28127ea3c3674a52a2d5d3
-
Filesize
538B
MD541825a111586c78809a97d6a1c5ef842
SHA11fdf441ac2458c335fbcd261f703afcebaaac80e
SHA256087e0227ebc2e9ffad81fc6c0e58f8d2bb639d35aee2a0744d301fd48216b1b0
SHA5120bfa835bff62f681d6c30419b8a22271e3bd0e7b88e79c5dbdc8206217eab9b78854cd669e4d765e725985bb0fa6824365cb35670f66767956f2fb473daa09bc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5edb72d7608356fe984bf1c0c0524c10e
SHA1992173b6f429a04822bcd09e915a059f7ab61068
SHA256e36db3cf2061d9a50f906f034e5afdb45638bf710d23236d697de2f631c81d53
SHA51276c02912ebadc46ee5261758f9613305c0f515bcc18e2a397aaa2104c001cbec47c3a216d8d8fb164a7077a68b9a81bfd17b4ebb84b05b783e8424bb24de96a1
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98