Analysis
-
max time kernel
1003s -
max time network
1014s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-06-2024 16:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://egirl-paradise.xyz/tlg
Resource
win11-20240508-en
General
-
Target
https://egirl-paradise.xyz/tlg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 2000 msedge.exe 2000 msedge.exe 2832 msedge.exe 2832 msedge.exe 5236 identity_helper.exe 5236 identity_helper.exe 5604 msedge.exe 5604 msedge.exe 5648 msedge.exe 5648 msedge.exe 5648 msedge.exe 5648 msedge.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 672 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
Processes:
msedge.exepid process 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe Token: SeDebugPrivilege 1424 firefox.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
Processes:
firefox.exemsedge.exepid process 1424 firefox.exe 1424 firefox.exe 1424 firefox.exe 1424 firefox.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe -
Suspicious use of SendNotifyMessage 15 IoCs
Processes:
firefox.exemsedge.exepid process 1424 firefox.exe 1424 firefox.exe 1424 firefox.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 1424 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 4260 wrote to memory of 1424 4260 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3580 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 3684 1424 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://egirl-paradise.xyz/tlg"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://egirl-paradise.xyz/tlg2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.0.955134121\1624991127" -parentBuildID 20230214051806 -prefsHandle 1752 -prefMapHandle 1744 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d1fc798-25a0-4502-be6c-01169e28a447} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 1832 173d4aab158 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.1.649841477\84291740" -parentBuildID 20230214051806 -prefsHandle 2364 -prefMapHandle 2332 -prefsLen 22925 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1e28bb4-86b0-4cdd-8ee7-aa97460e4bdb} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 2376 173c7d8a858 socket3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.2.1999370878\300195314" -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 2908 -prefsLen 22963 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {538d0609-95b3-42ab-9256-75f1246ce5f6} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 2876 173d7751258 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.3.1736135325\974952015" -childID 2 -isForBrowser -prefsHandle 3660 -prefMapHandle 3656 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa496deb-9f14-41c9-b003-eb151baf26bc} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 3672 173da6d0258 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.4.1839012917\549488807" -childID 3 -isForBrowser -prefsHandle 5060 -prefMapHandle 5020 -prefsLen 27690 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6929c1d0-8949-484d-83b9-e620dbbf59b0} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 5068 173dc4fc358 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.5.870652218\258870376" -childID 4 -isForBrowser -prefsHandle 5300 -prefMapHandle 5296 -prefsLen 27690 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54eaa3c3-db94-401a-b86a-1a1395962d8d} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 5308 173dc4fc658 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.6.1256250363\264981490" -childID 5 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 27690 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9cbbd6f-dd3d-4524-9c03-ff42ca566ce8} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 5188 173dc68e258 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.7.754399688\1561282280" -childID 6 -isForBrowser -prefsHandle 3552 -prefMapHandle 4312 -prefsLen 27769 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {180e5835-0b4d-4feb-8458-e48cc2cb586a} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 4440 173d4fb4258 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1424.8.1455075523\617511331" -childID 7 -isForBrowser -prefsHandle 5664 -prefMapHandle 4840 -prefsLen 28034 -prefMapSize 235121 -jsInitHandle 1356 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11d1a7be-ffae-4999-ac47-875deefec25b} 1424 "\\.\pipe\gecko-crash-server-pipe.1424" 5652 173d3df2558 tab3⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff90a443cb8,0x7ff90a443cc8,0x7ff90a443cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1712 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,1519672855203250079,7473705683146893061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1052 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD58294f1821fd3419c0a42b389d19ecfc6
SHA1cd4982751377c2904a1d3c58e801fa013ea27533
SHA25692a96c9309023c8b9e1396ff41f7d9d3ff8a3687972e76b9ebd70b04e3bf223a
SHA512372d369f7ad1b0e07200d3aa6b2cfce5beafa7a97f63932d4c9b3b01a0e8b7eb39881867f87ded55a9973abea973b2d2c9b6fc4892f81cec644702b9edb1566d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5390187670cb1e0eb022f4f7735263e82
SHA1ea1401ccf6bf54e688a0dc9e6946eae7353b26f1
SHA2563e6c56356d6509a3fd4b2403555be55e251f4a962379b29735c1203e57230947
SHA512602f64d74096d4fb7a23b23374603246d42b17cc854835e3b2f4d464997b73f289a3b40eb690e3ee707829d4ff886865e982f72155d96be6bc00166f44878062
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5da6fbe9a10945e0004218ce7b60c863f
SHA1f6a769e56ee50f56da8a664a51eaec65c7f2fab1
SHA25684ad9ffed868bb1be5ea52e0cb40a97c6e937aa684f4200b00bb8b624b92a266
SHA51216908e92eb44e2aed4bf55afd554b724836cf328da0962b5451005177ed6d6789e7c3fbffc5abdc405c4740174d7ca799ba74c3d7c975e325d52b35168ba5045
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5921667b914e73f5f34a32290bfa3ea93
SHA141a1a6cdaa12d2df1650d1896785919f971183b4
SHA256bfbeefa358225a9cdace286d4cb12140e8739d4f3f51b9f2eb725ba8f7294603
SHA51284c940acec93d8b843a5dd6e57c8db965f4749bf85ecf8953b2e939f1ef245449b8b91a01b636bcd1986eba842d40dce7e158d4de6541cd394af61e70be3fba6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5d38ba3dba64b606f1fbde46655f28afe
SHA1a73d522601fcb72505495ddc38511122b8ed187d
SHA256d05aa7e3dca762c3f094b6a42de00612d8699c09edea3edb44a5b8d449508aef
SHA512ad6f846d4214eed2adce7f8e242eede6816c3b18bea1369131cdb37874ff51772b9cda6e0fcbb3bc72be9d9299f7f8245b2a232f1c831f7a5c9ca30f2f5762c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
8KB
MD5480c89369f814ff543f1540d2b1ad601
SHA1afdfb293db173de499b945a121db10ed5f36fb95
SHA2562dbf9cb7f9cafe5fa72ddfc35827260c3f3b9716c2d9ad076597c6b40f416513
SHA5126b35dbb380e0ec8fc5c26875e3db5a19c66b321115d8fa7499f9b0fcbd8df106195cebdbc323697d79dcb952b6b6ca389282e03bfb6c7f31f5c1b6b8d0a72f03
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
8KB
MD54c79243bd7d48f2954ab6b004f34f981
SHA171b1536e268fb0d4fed36892e15ee78550652c1c
SHA256f922f2e1fdd4d21b71e75165a8b8ffa9f0f7b4ccc9f34523f540a5935d7263d8
SHA512facfe98146f33ccec73a3287fc31416ee673efc9b5ef2c91288c1b05cc3090aa34d1f721ed0674483e5d5bb23cab8fbc9477ec3ab633b51174fe2df87fe7bc7b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3qt190sk.default-release\activity-stream.discovery_stream.json.tmpFilesize
23KB
MD5e1cc7f919170e950ab9e498681eeddf9
SHA194144e8a5bacf49a5bbf795c20290814a68d05e3
SHA25693adea62ae5ff8d6b97f05248036ce38d481d047dc295ffc28d0b789f59c20e3
SHA5122b1e69358a5d333540bc57ac71f2ad874e9a26236eee5cb1e4e6bda7c1ad6d3e1b93d481e299b6e5716cfb327ac295b9d8bb879b6cb0d7094308661e1b1ccdc4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3qt190sk.default-release\cache2\entries\099EB2BF8827A4F91EAB3E38B14650D0205226F2Filesize
16KB
MD5fb734bbf742b4ec65926aedf0aea2ad6
SHA13964a68757e403b5a7645320d55f0fdba6641500
SHA256393d40a5effab3ea00320ad34bd9b284ca6c1b34f9dcc1b138734cf4205335e5
SHA512004f4cc34b9329a4aacef68606a293048eb21847a6660884288a2772f70e43f12b08e5802d0929ba994798710eea82126cb5216449325a74a1ede409d0e7b98c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
5KB
MD5d1edcf2f7b81d5d4a6a91c3b69e2de8a
SHA1dc25897b64a717f2bbc2b0fc536377756942e961
SHA25667f32b9fa03918b30538b3e31ce681b60beda9b81dabaa2a9accd52491f69cf8
SHA5125a1d754286b3e7737f38a47821ca3029f5c8c570fb1fcbe34fa5eb271c926af87f62f3a9c96691bc2f47c9f900cb21479b5f27c3eda97a55d9b521c66aa561cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\bookmarkbackups\bookmarks-2024-06-12_11_suW3jlX8MorawCiDOxmilg==.jsonlz4Filesize
998B
MD5e29ab902578c52589f843b13791f1458
SHA1114afd8e23882730ce3d2144265214c5f326b150
SHA256bddd419c85bbb2bb58a3fd5a44862e253485449781c893fd27b8a25b7f23f497
SHA5128bffb38a5c861144303e32a76ff2869bd5872b39ca6dd52c7d0c4ec2e34951f32b91d7cd68843ff7c8ff203569887eb5214b4af35a2038f9c8dfeb7c7c2b7a8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\broadcast-listeners.jsonFilesize
204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\prefs-1.jsFilesize
7KB
MD5741b16d20fd619eb166449a754ef6749
SHA14e68f39d821b971014803868195c13b6c5fee82e
SHA256ec5042ecb7e5ba6b93797983bcf32c9d6d28e00fd261f056531fce897ecfe8ad
SHA512eecddee9f47f66927022460e653d5d45b80817e4fd384a6d4f7c8e870e8792997a2017ec3e8a62663ca61a8bf9ca80671f90448d4983a7e5b274619694f9ce7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\prefs-1.jsFilesize
7KB
MD5d0426fedf98a2a05df64b1b334ffa710
SHA139cc766bbfe012573abb02cd57df1cefd2360190
SHA256805b165274f6b76a0a5794b14486ef9ef5d78b730398ab9e5d2301ed6e74948c
SHA5123f1c948e23fb2bebfe78e720fe551894e56bd514f29fea5e84965db2cb3e0583c9cc8b0de769593d92f12d94c8073b8c4759a338457c8d7c5d389fa847c305ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\prefs-1.jsFilesize
8KB
MD53517ddba0a1d696430e4bf8d6d91fc8e
SHA12ba85f439d7f0900294c58a66b90b627d80c0d0c
SHA2560e714420e95b36c1df619ef89d778401233e183bd395929e37db2a77c671e548
SHA512e5c7b23a8a68ab719696cfd2a6fc2718557dde26ab10ed9b6de60f93f903387249d9eb1d221590cdcec1650872f06fc60d8157f56a4fe5ecbf6a48ce4ff003fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\prefs-1.jsFilesize
8KB
MD58baddf12ae7662a3b2b25529f904feb8
SHA1b8217dee6c294ab3784a1f044fa85f1b674a02db
SHA256fef501dc95d37828dce1079a7054b5b7a399ad32184ac78a0624120962406a10
SHA5126c1a2fcebc745a9287440dde4c06bbf495b6e4dc74d5752b8b6ba9a2305528856a8a978f2988fde8374f4ded1b7cb4fddd3f2b6f3ba62f739c5c6dbba7d9ee16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\sessionCheckpoints.jsonFilesize
90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD5dedf46aab2501808820f1e3770e35bde
SHA1214fbcde153ed3e5fc13e3752879e75fa4becfef
SHA25600c7bf7416c8a67b11754453d05dcb26318ae449c82d47244f728daa6bae2de1
SHA512907aebe36b308be8aa7972504b1e0b504a35e090c1a0ba0f5d79b1fba9a763575b3de7cc90017ea4111c231acb1e2bde865397675cfe312359dd5d78582be33f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD522ccd295bd5b4d39d0bcbd2a732eae53
SHA1cc5cdb806638bf24cf55ac34158eda2d9f6f4719
SHA2568f597daed1bb1bd108824915db737b832425452c298018e540ec5a73444f49e0
SHA512646e02f7a8f8ba56b004257acacb2abf713b68d72d6fd9b87e74f936a1c9f21c181cfe4bd095fb5d3f7b18f12fd4234d668382b1559f51132144185d93492499
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1018B
MD5da793ae5f79cb55de825b6905a47faa0
SHA1251c2a9591b6bc1e63debc8c6f5d3bf3e487fd10
SHA256e342055afb27792486ad905849f89cce6ff3178c5276687fdb3cf7a69848260a
SHA512fb1d64f9395fe2298edad698f5658eac7a5c9430c795f912c9eeb7568b287377d759d240b8a6fe1c14d836d07fdca4f4a53d88ef5c478fa74ffe0a70aaee5a29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD57168aa6467350151407fab2f51a5d61e
SHA1859a7347be03733610cfb53d08573ac7308b342e
SHA2567d2b7e7174ca599dc65075faf2ebe9dfa18a5d4e2dae4554315b1a21186ee298
SHA512a2ad8f0d9660cbbe6ac4118322a82d311bda045ad18de78487df4adf24b993049a289778c06b40d2d30b19d0e50daaa05ad23f86595edc6fc11fe73e0a00cc7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1019B
MD557b488b18a6ab81dcfe70823d445a0a5
SHA1f8422702efc9f3d5fd3f39cb42a6e0a2941f8532
SHA256ebbf3dacb1a7c25b52b97a0ba2420a528ba85b67e95fe6a07d1ade020facbd4a
SHA5128c47701e5894225a0f8a8bfad975f440d0c586cd8421e3bb4c727e001090c310fff121061c617866894d344a0a74d5f4923e4fd9f064666ea98f23834834e786
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteFilesize
192KB
MD5d0417f57812a32322c1c80db41d9337a
SHA153962d48c7b5badde18d1db38785a4dee5886178
SHA256eaa98704242a4a91d9ce451771e8788bce7cee26fb3de8d203f007a7417d0184
SHA512403f8ddfe5fbe8944e833c359e2595b965380b65263831d393c2e95749c5025597e5e5091824568f8256a93747912563ae65dec3a98887d44747de6f8eb395e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\targeting.snapshot.jsonFilesize
4KB
MD532107873f2d00e81e2f7bb618a9f1333
SHA1ca2de14b379bf377aadd19a5e2d639eb25ddffcb
SHA256e1dfaae34ae0bdee7d61f48cd12ddcb092054707644d49d03451d9172df465bc
SHA512648b5f3a1709f11e277512eb0efb9474d186aa30e0f28724b259cb386a1f705c7ecc56ef17f92c3bbdcf631e2b436cd37b7e576e201f9008fd95877f42a0acd9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\xulstore.jsonFilesize
141B
MD5b847f28acdec63348ea376efd4278d02
SHA1da4ae0ce914885ad7fe1f89aef3aa4f324747091
SHA2567e63f727108182d4afdf0ae5131c9e0692d857b934fe8d93a7d4a8cea58fb834
SHA51207b89826d35c5b9f056c8556ed5dd0a961f779d1aa7639321b90c56ef65bf6706a653a22f7790543b1482414069d5587c1f1c28215e92a7ffdf0fa4a55537c08
-
\??\pipe\LOCAL\crashpad_2832_AOWOSBOCCEWMPNBAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e