Overview
overview
10Static
static
30697314d1d...a5.exe
windows10-2004-x64
100f998493b8...79.exe
windows10-2004-x64
1021e1937094...38.exe
windows10-2004-x64
102800d64eb3...31.exe
windows10-2004-x64
103d64fae31a...d7.exe
windows10-2004-x64
10652a4e2d36...35.exe
windows10-2004-x64
106b4d258a8d...1a.exe
windows10-2004-x64
1074c99e0dfd...42.exe
windows10-2004-x64
107e6bab9491...d0.exe
windows10-2004-x64
80af2b3540...7e.exe
windows10-2004-x64
10a96b277202...ca.exe
windows10-2004-x64
10c1237a6a46...5b.exe
windows10-2004-x64
7d7fde0f5ef...97.exe
windows10-2004-x64
10dc220ed080...4e.exe
windows10-2004-x64
10e5e7bb0a7c...4a.exe
windows10-2004-x64
10e91c8d8104...e0.exe
windows10-2004-x64
10f3b6442113...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
0697314d1d15813c538133353196a25ddf09e9340585e2de0be061757a02bea5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f998493b83f94488301c2a7f85ec4ad445820110ece601aee7e9d15a5ae5179.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
21e19370941ed45f65950d345652c8fe76f4f409b0bbb8261c579fb219042338.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2800d64eb3bc5b7c1f807e9baaf76c469f1d63f07cc116fb310c5c866087d931.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3d64fae31acb5d4e6e0319606608e94d2b3a017279c295dba43ce4d28aab53d7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
652a4e2d36de8360e61d407c228b3eb8948cafa60881c208bbd568afd7222f35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
74c99e0dfdc0750268c34c3d63288e0bea52796a82c9b157a495fbe2608d4942.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80af2b3540716fa5dcd664b7f7ed120e1c1aa575c2fc1e1b6ee5df1723f2ab7e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
c1237a6a46458518390f044aae909d7b4e395ae64c6bb1db16e0cbe581f8d65b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d7fde0f5efb7f555528ff1c98946e36088ec7396d07c4fd0a577c6b49c4bcd97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
dc220ed080f58ca4a078f8ea2a3ba2d42611f3da8514d41359c39eae805b1c4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
Resource
win10v2004-20240426-en
General
-
Target
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
-
Size
1.3MB
-
MD5
ba596649dd39015b9ebb20e53e576673
-
SHA1
1f6bb78f5decfae319019346d7a2c5c2d5be2cd4
-
SHA256
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0
-
SHA512
4544fd2669ff8d9632241040946868026712ddc7faf1a0db708ccf8f0c7edcb92a6c6ec9167b59421014158b0f27353b6afc4026d3a2748bb7fa3252e2747f57
-
SSDEEP
24576:gyfJAGy3eES79rsujbjYlvUJG76Sh44Q+x6/7XOHG+nnsQPGKkUw:nfJBbES79rjYbth44xsKxJPGKk
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral16/memory/2560-43-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral16/memory/4516-28-0x00000000020A0000-0x00000000020C0000-memory.dmp net_reactor behavioral16/memory/4516-30-0x0000000002490000-0x00000000024AE000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5QR4sy2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5QR4sy2.exe -
Executes dropped EXE 8 IoCs
Processes:
EE2Ip30.exeuu9aR70.exeat1Tc45.exe1Tr42EG0.exe2Je6892.exe3gW94Vu.exe4aZ207Wr.exe5QR4sy2.exepid process 3952 EE2Ip30.exe 5028 uu9aR70.exe 208 at1Tc45.exe 4516 1Tr42EG0.exe 2536 2Je6892.exe 2356 3gW94Vu.exe 864 4aZ207Wr.exe 4688 5QR4sy2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exeEE2Ip30.exeuu9aR70.exeat1Tc45.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" EE2Ip30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" uu9aR70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" at1Tc45.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3gW94Vu.exe4aZ207Wr.exedescription pid process target process PID 2356 set thread context of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 864 set thread context of 2560 864 4aZ207Wr.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{1B145D9B-A152-43D6-9B43-ABBB9763C57A} msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1Tr42EG0.exedescription pid process Token: SeDebugPrivilege 4516 1Tr42EG0.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exeEE2Ip30.exeuu9aR70.exeat1Tc45.exe3gW94Vu.exe4aZ207Wr.exe5QR4sy2.execmd.exedescription pid process target process PID 3808 wrote to memory of 3952 3808 e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe EE2Ip30.exe PID 3808 wrote to memory of 3952 3808 e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe EE2Ip30.exe PID 3808 wrote to memory of 3952 3808 e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe EE2Ip30.exe PID 3952 wrote to memory of 5028 3952 EE2Ip30.exe uu9aR70.exe PID 3952 wrote to memory of 5028 3952 EE2Ip30.exe uu9aR70.exe PID 3952 wrote to memory of 5028 3952 EE2Ip30.exe uu9aR70.exe PID 5028 wrote to memory of 208 5028 uu9aR70.exe at1Tc45.exe PID 5028 wrote to memory of 208 5028 uu9aR70.exe at1Tc45.exe PID 5028 wrote to memory of 208 5028 uu9aR70.exe at1Tc45.exe PID 208 wrote to memory of 4516 208 at1Tc45.exe 1Tr42EG0.exe PID 208 wrote to memory of 4516 208 at1Tc45.exe 1Tr42EG0.exe PID 208 wrote to memory of 4516 208 at1Tc45.exe 1Tr42EG0.exe PID 208 wrote to memory of 2536 208 at1Tc45.exe 2Je6892.exe PID 208 wrote to memory of 2536 208 at1Tc45.exe 2Je6892.exe PID 208 wrote to memory of 2536 208 at1Tc45.exe 2Je6892.exe PID 5028 wrote to memory of 2356 5028 uu9aR70.exe 3gW94Vu.exe PID 5028 wrote to memory of 2356 5028 uu9aR70.exe 3gW94Vu.exe PID 5028 wrote to memory of 2356 5028 uu9aR70.exe 3gW94Vu.exe PID 2356 wrote to memory of 2844 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 2844 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 2844 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 4396 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 4396 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 4396 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 4044 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 4044 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 4044 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 2356 wrote to memory of 1508 2356 3gW94Vu.exe AppLaunch.exe PID 3952 wrote to memory of 864 3952 EE2Ip30.exe 4aZ207Wr.exe PID 3952 wrote to memory of 864 3952 EE2Ip30.exe 4aZ207Wr.exe PID 3952 wrote to memory of 864 3952 EE2Ip30.exe 4aZ207Wr.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 864 wrote to memory of 2560 864 4aZ207Wr.exe AppLaunch.exe PID 3808 wrote to memory of 4688 3808 e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe 5QR4sy2.exe PID 3808 wrote to memory of 4688 3808 e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe 5QR4sy2.exe PID 3808 wrote to memory of 4688 3808 e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe 5QR4sy2.exe PID 4688 wrote to memory of 3480 4688 5QR4sy2.exe cmd.exe PID 4688 wrote to memory of 3480 4688 5QR4sy2.exe cmd.exe PID 3480 wrote to memory of 4556 3480 cmd.exe msedge.exe PID 3480 wrote to memory of 4556 3480 cmd.exe msedge.exe PID 3480 wrote to memory of 4488 3480 cmd.exe msedge.exe PID 3480 wrote to memory of 4488 3480 cmd.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe"C:\Users\Admin\AppData\Local\Temp\e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe5⤵
- Executes dropped EXE
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2EAC.tmp\2EAD.tmp\2EAE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:4488
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3976,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4052 /prefetch:81⤵PID:1640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4652,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4976 /prefetch:11⤵PID:3584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4904,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:11⤵PID:3536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5324,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5468 /prefetch:81⤵PID:3152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=5332,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:11⤵PID:3192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5860,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:81⤵PID:932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6012,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:11⤵PID:2520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6128,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:81⤵PID:3740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6272,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6416 /prefetch:81⤵
- Modifies registry class
PID:4400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5524,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:81⤵PID:1552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5828,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD50ec04fde104330459c151848382806e8
SHA13b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA2561ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA5128b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40
-
Filesize
99KB
MD56bd6fb9952fa18f6e52f1e9ef0cfb385
SHA1e1060312496d9e0bedf94df585b7863ec67ef42b
SHA25689ca04731834695e5a1e35404e6c408b3cf420fcd34c9e053f9a3075b4e2e6fa
SHA51204e89b9002406375764e6e8a369de9dde35c3836e6516393a84df50b1bf44b0bc0d920c30dcb781dd4679bc4b512f9d47997f193f16ad8779a0e9be06fda1483
-
Filesize
1.2MB
MD52d06bb1883376c02addfdae30c4674c6
SHA139256ee881bab5b8a39ed57ed4c486fe9a8dd70d
SHA2561d350c9449236440b90b533da9a3681d802230b17fc646e4f39fac8b06d28564
SHA51290545e90df858c97326e20de98bb86ad0ed25f50bbbe4c1563c71f9606bb697be5e63cb81e722bfaf594a3b355fb18d16d38f1a26e2ad3d12f837e60f1021926
-
Filesize
1.2MB
MD5267ef1a960bfb0bb33928ec219dc1cea
SHA1fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf
SHA256b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e
SHA512ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f
-
Filesize
749KB
MD5a4a164fa5c5e796e10b4d328ec8d73a5
SHA1a102c3367d3161a4bfe6c0988bcd891f744c9036
SHA256ea7601c6ee113edfc553fd5ff05c1f8ae21bd30d793c426a7b3a9dc5cce47dba
SHA512ca7b82ebb4b57aac7404d6553cc05871b618175d04022819958e479c31bb8361da588224223ffac1b3e448f51d24043c4e972f01d0da622d9545652fe6038f0e
-
Filesize
973KB
MD55dc4be46727c1853e63ebdd240ec9bd9
SHA16265b41bbecbb96cf666d2b4cbd6f209f44d7a2d
SHA2561df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446
SHA51259828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b
-
Filesize
364KB
MD5455347ba3d7b41331dfee6bf9eee794b
SHA16b4e14e85ec934c26fda86b0071cc25a1fbb1627
SHA256028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5
SHA5127126814a86b53bca08d83cd552d5dd5c7a2700d76855afb37cb0192ea1e2d2cacd4970df01c4cc53afb53169206a9b0a502e120f227d08d7580e45c555eda933
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837