Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/F367-049B-0F3A-029E-DF83
http://cerberhhyed5frqa.qor499.top/F367-049B-0F3A-029E-DF83
http://cerberhhyed5frqa.gkfit9.win/F367-049B-0F3A-029E-DF83
http://cerberhhyed5frqa.305iot.win/F367-049B-0F3A-029E-DF83
http://cerberhhyed5frqa.dkrti5.win/F367-049B-0F3A-029E-DF83
http://cerberhhyed5frqa.onion/F367-049B-0F3A-029E-DF83
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16408) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" TCPSVCS.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation TCPSVCS.EXE -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\TCPSVCS.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\TCPSVCS.lnk TCPSVCS.EXE -
Executes dropped EXE 3 IoCs
pid Process 5036 TCPSVCS.EXE 4736 TCPSVCS.EXE 4012 TCPSVCS.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TCPSVCS = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" TCPSVCS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\TCPSVCS = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" TCPSVCS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TCPSVCS = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\TCPSVCS = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp549E.bmp" TCPSVCS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 1056 taskkill.exe 2088 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop TCPSVCS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7F378566-32CC-194C-63ED-AAB4EF64314A}\\TCPSVCS.EXE\"" TCPSVCS.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings TCPSVCS.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4760 PING.EXE 928 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE 5036 TCPSVCS.EXE -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 5036 TCPSVCS.EXE Token: SeDebugPrivilege 1056 taskkill.exe Token: SeDebugPrivilege 4736 TCPSVCS.EXE Token: SeDebugPrivilege 4012 TCPSVCS.EXE Token: 33 4948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4948 AUDIODG.EXE Token: SeDebugPrivilege 2088 taskkill.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1856 wrote to memory of 5036 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 93 PID 1856 wrote to memory of 5036 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 93 PID 1856 wrote to memory of 5036 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 93 PID 1856 wrote to memory of 4616 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 94 PID 1856 wrote to memory of 4616 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 94 PID 1856 wrote to memory of 4616 1856 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 94 PID 4616 wrote to memory of 1056 4616 cmd.exe 96 PID 4616 wrote to memory of 1056 4616 cmd.exe 96 PID 4616 wrote to memory of 1056 4616 cmd.exe 96 PID 4616 wrote to memory of 4760 4616 cmd.exe 98 PID 4616 wrote to memory of 4760 4616 cmd.exe 98 PID 4616 wrote to memory of 4760 4616 cmd.exe 98 PID 5036 wrote to memory of 512 5036 TCPSVCS.EXE 115 PID 5036 wrote to memory of 512 5036 TCPSVCS.EXE 115 PID 5036 wrote to memory of 2184 5036 TCPSVCS.EXE 116 PID 5036 wrote to memory of 2184 5036 TCPSVCS.EXE 116 PID 5036 wrote to memory of 3328 5036 TCPSVCS.EXE 122 PID 5036 wrote to memory of 3328 5036 TCPSVCS.EXE 122 PID 5036 wrote to memory of 4932 5036 TCPSVCS.EXE 124 PID 5036 wrote to memory of 4932 5036 TCPSVCS.EXE 124 PID 5036 wrote to memory of 1572 5036 TCPSVCS.EXE 137 PID 5036 wrote to memory of 1572 5036 TCPSVCS.EXE 137 PID 1572 wrote to memory of 2088 1572 cmd.exe 139 PID 1572 wrote to memory of 2088 1572 cmd.exe 139 PID 1572 wrote to memory of 928 1572 cmd.exe 140 PID 1572 wrote to memory of 928 1572 cmd.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXE"C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXE"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵PID:512
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/F367-049B-0F3A-029E-DF833⤵PID:3328
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4932
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "TCPSVCS.EXE" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXE" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "TCPSVCS.EXE"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:928
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:4760
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1748,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=1404 /prefetch:81⤵PID:5020
-
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXEC:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXE1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
C:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXEC:\Users\Admin\AppData\Roaming\{7F378566-32CC-194C-63ED-AAB4EF64314A}\TCPSVCS.EXE1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4488,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:11⤵PID:3044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4912,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4792 /prefetch:11⤵PID:548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5272,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:11⤵PID:748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5284,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5448 /prefetch:81⤵PID:2864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5288,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:81⤵PID:2016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5928,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5944 /prefetch:11⤵PID:1728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=6104,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=6096 /prefetch:11⤵PID:2780
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x42c 0x4d81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6108,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:11⤵PID:1832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=6444,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5312 /prefetch:11⤵PID:632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=6740,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=6652 /prefetch:11⤵PID:4952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --field-trial-handle=6792,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5316 /prefetch:11⤵PID:1776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5372,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=5744 /prefetch:81⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5854bb5000074c3c81f6d6951be9224ab
SHA198a9e4046d22c38bcafec0698fe462d3955f53fe
SHA2560f61501e20311f3bb39ed5be86ac7e9b0420fdd237aaa175f3982b12902059d8
SHA51262928c746ffbc49dd67eb0b92555ab9026215856a6f508356777f7f292e7c93e14b90fa0d34cafc2c15c8bfad4d9fcbe876160dfe6a57ceeaa834d655f063ec7
-
Filesize
10KB
MD59b47b0a1c6b86ee866552405187dd306
SHA1ea828fa815be1562e65365a7e382f8ad13d9acb0
SHA25607443aab159b93626a79c433898daa2af272153ba734d621de4bb382b043b4d7
SHA51240d7c5e492ac9b203ad9dba4d8ba0b9910eb6eab3fe0f3046fd5989e67839d7adbb8fb9f5a013a6a87a44ed97a6dc1b62aae70d95144d694c280a634cdab665a
-
Filesize
85B
MD5b0e31e4c41ec18ddbb3259bd30ecda2a
SHA1afcfc2b8dcba9ad229eb2a00862b07042fcf266a
SHA2566928a0290e82802282f906b61de5c58312010ff707bc9e9655ddea5a195a7ad1
SHA512b43fd334f5a62f578a89b5b4a3a4ac247fe972c7c851dad4712fd78e808f03399f490dfa0090c15e5aeb9047dba5c13bf609bdd927dc318fdb9365d9954ef2a3
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
1KB
MD5f5d5ee37775933993ce437b358d175aa
SHA1d0e16b5cb47f240d0f95b3f52ed33aca314e468e
SHA2562b5dcda5ae0b2611af0f71fa8a081bb32778aab2a20a4cdede395ba1a13a0b84
SHA51295e05e90f5aeadfd67973eeb0245bcfb82da312e739b00fae5b7af23ed0fae9e78c0f080476935b6f58ba25a9a659df5ddd665dfabba56cfabfa21405d719917
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684