Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe
Resource
win11-20240508-en
General
-
Target
b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe
-
Size
894KB
-
MD5
20822cf9ff71c5db258373523edb25b7
-
SHA1
34b40f65ef87ccd0435e765bfc505054fdec4299
-
SHA256
b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58
-
SHA512
89da892900c21149be669b6b64551fddf8acd78d0185e25920bad59172e147a46a222a1c0009c4afe62b14be20c2b2de402eef98a267b298d9627d31224de6ed
-
SSDEEP
12288:VqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4T5:VqDEvCTbMWu7rQYlBQcBiT6rprG8aA5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 4800 msedge.exe 4800 msedge.exe 4884 msedge.exe 4884 msedge.exe 3660 msedge.exe 3660 msedge.exe 2912 identity_helper.exe 2912 identity_helper.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 3668 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 82 PID 2724 wrote to memory of 3668 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 82 PID 3668 wrote to memory of 3964 3668 msedge.exe 84 PID 3668 wrote to memory of 3964 3668 msedge.exe 84 PID 2724 wrote to memory of 4800 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 85 PID 2724 wrote to memory of 4800 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 85 PID 4800 wrote to memory of 2124 4800 msedge.exe 86 PID 4800 wrote to memory of 2124 4800 msedge.exe 86 PID 2724 wrote to memory of 1396 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 87 PID 2724 wrote to memory of 1396 2724 b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe 87 PID 1396 wrote to memory of 3788 1396 msedge.exe 88 PID 1396 wrote to memory of 3788 1396 msedge.exe 88 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 3576 4800 msedge.exe 89 PID 4800 wrote to memory of 5116 4800 msedge.exe 90 PID 4800 wrote to memory of 5116 4800 msedge.exe 90 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91 PID 4800 wrote to memory of 3368 4800 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe"C:\Users\Admin\AppData\Local\Temp\b159c429c3072e1e9649127d637c770082e68ddcd32027beb0d1349c636b7b58.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047183⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6158295998420363373,771427721949677408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6158295998420363373,771427721949677408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047183⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:23⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:13⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:13⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:13⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:13⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:13⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:83⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:13⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:13⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:13⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7045451515055371358,8563966750542827401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047183⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1524,12027354811545656582,14853683074650049528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f89ecb8d777bc40b4e0f13ab530656b0
SHA1bfcb3bd149fe8d14cb08599a682027ebe831999f
SHA25639319037099635840d96f72d020118aefbb3779637fbf731ccf37110604d12a6
SHA5122f80a511256d82947e5879c152bc99d21215fd3ee4612259bf7f1643909bbb5e04635bfc63594420ad28c9b09153368dc85de2e4dc7f4c12ee92c593571a5539
-
Filesize
2KB
MD512bcfef88291f43b8e6cc6cf63705907
SHA18cbe2eece762aaa386228bd943d30bbedaee97e2
SHA25625f1dd441ea637b9332ed0f2a02781b4fda61da73b7937fca1c6f3846bfbfca3
SHA512686f0462595eeca3f1fc60d74ebecf6a72e7fdeacba9c98d6bb7ee84a8f6165f7dd12982caee56db8e952165b6ecb874e897500c4dcf30dc35859589496610fc
-
Filesize
2KB
MD5e49c1136a4fb1124085c9d268884edc0
SHA1269a752d96aa54a5953a5a8c163c17618993b309
SHA256bad553eb6f15373490741a94e16bd456ff51e6603518dae9d601342f95ea8c54
SHA512fd1b5db9f555ecb6e221430661400aa0cc6abe8513af7e0cc73364d6af05cc0429dc2bc365ea96c8f3d0421d82b2a963d782ea7f67c576e90e501f7952fb24a2
-
Filesize
6KB
MD5a6074420ac2e6b7df0dd9ce8b6d3ee70
SHA15da811e90fa2bf3f1043bc5f3c89c3dde80df5c8
SHA2565b3b4b4569426520b0f09501f59e5e547e9ea324132e43c5881c2b1b99ad4000
SHA5125645aede278055191b18a7d271b2743faad5b1af56e3a3e173da78c69023ab9c3cdf73c1be9b7051529f82a314c75cacc195fe659481fce3f718025b6de0969a
-
Filesize
7KB
MD5703458a4a4d051d96e1d702f93a650a5
SHA1f6ff9007f8bbc8a062d72f9253accdda327f4638
SHA2567370bd994af74af65571fbff29a39388ca559351f840ca9e2b71e621aea3a553
SHA5127c5644ac3043ab18754536718c22a75bf3122a2b64688b7b0d5309c9b03ae2dc08c4972e26eed0a669263a15445f6ee3ebd73b9b702229783ff1574a1bd987b8
-
Filesize
707B
MD5aafa7ba81982e36f78ba34deeccfac31
SHA1c1571f5d5e788802734a4ae7cd668dee97a8fc81
SHA2569071a71d9bea2aed729a8e690066de0bf898fe7e7c63ed91ce9d9c57a3393111
SHA512064a80a2ee69aa1af1ccdd0a5b7ef14cdfa755ce82dbc94750ba6ea58e014f4e84788400b50d095fbe1247540a32a18e76f2b9e332e861a84149abdffbd4240a
-
Filesize
707B
MD5e51745379171b37a47c7e5e03ccdba99
SHA1ebe58fbf5710914851dcd5d301d6f65d933b1262
SHA25656ad6dcc065562b8f0608b5b1da30cd117579866dfb78f714a64905e41135305
SHA512c035c0a54f9da26ba58240486d775d5059b5728d6f41e071a922c3324f153d1485006c2178ad77a318f7a774b1ec70e99df86e05a1f4823b539e2d316101c9d8
-
Filesize
707B
MD5e3238f0a279b88b7ba827b66bcbd5d00
SHA10c24b957310c788b94d4031db954ef1220a70ef5
SHA256928437a6af08c61da7453f4108a1f2b3cb688944bb017559b5c0c415fce1deb3
SHA512bd24387f7349eb01fe03b59df3925c0aa5306e4686ef71a1c9c381d3ac45ed3daa86cbf5d52ad1f21174ce19185716bfeaa9390181a9940deb37e4746f4114b2
-
Filesize
707B
MD54573dd8d9272007527c401e83348197a
SHA1352e030d3bbace9c9d59ebcb703dd5817e542db8
SHA2562c8a2141c6fab0385ed36a79c8fab742326e4b31e20988a7ca6b0a4bea224cb3
SHA512115d3fee20a599c4cba1c90819bc9283aff9be12e5ea6f39b585a46e72f862212e47b3f18ee4cce331a6a4299f860cbf11ec8dbbe1d1466dacf5dcf921f148a4
-
Filesize
707B
MD5b59fd27161648f24cb8eeec81c1e1158
SHA16c5ea15f86b4e99b3d9a73349a4a317fbfe5214e
SHA25659b05b9ed2648dfb1fb2bc2dc3307971e822e43c13596c99204892c2f300e2eb
SHA5123dbe5e1eef541a62dfb3ac628e82b9d0e6712fb8e47218b6216817e91952c1507e227a073e77342a4a1115ca5256d6a143d41d634ada7089049deb260b8f5a6d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD59b1b54e9d0952ad38fa29b91c2270d3c
SHA13146f8f72c2ad78665b54fb6f0e1cd82d4a6ce13
SHA256944ffb7608542946d8f7c3a509ecf586276e5dd58357e232fb22a2ef5e87b5d4
SHA512b4861ed176eb192310551ebf3b2c2250c24265e1723e0a747082237e5d0b11db94855bbab31a7b4efa937ed001c3a6700276d90e5cfebfa4f079205d952a2743
-
Filesize
8KB
MD59ecfb793f3e44b2e121780468586e8f1
SHA17d91a8e3f936cb1f58877d8cf48c9139a7b5e18e
SHA2562ab653204770e6b52a6013d3c40b6e8ff7fd5e013bfc956a25a257842dda199b
SHA5126222d65e3864a86c69c252ad7bb76af49c04a3abaf6796f98bda6dac47593b5d48bce4b31f1ed87cf092c7300ec70ce64894734540fc751a732e5cbe92261dc0
-
Filesize
11KB
MD5cc6265702fbdea7b38bc95967b31165d
SHA1aca46b6bbfc16b3c434948a398374047eda5a173
SHA256960db0a6b7bd8404128b7239dd92da7c903262c48ba0a0a0c21e36a0052930a7
SHA5128b52a470e933112dec0d23117b8001318336cb69a1fa6d51968c7863013b2546e0c1f35b78a6d59f5e6935d0da77e73b6dd2c1ffa31642fd2b8c4e5941603967