Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
208s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/06/2024, 15:09
Behavioral task
behavioral1
Sample
f_000ebb.pdf
Resource
win11-20240611-en
General
-
Target
f_000ebb.pdf
-
Size
49KB
-
MD5
87b4975a077e93b8089315d96a436883
-
SHA1
dea330672122ee19e815727e2735df03593f0f3d
-
SHA256
8a3ed8f59bf59026f0f6ae831da3d60506d0ef06d04f8e2799dd532ec2bd23f6
-
SHA512
17299487e70004c65a200f93edeba7772f0ed4678ff5d006c862682070000793f82ea697426f03b102065fb56a1892134a911535133143b6b5ed8970269a5a25
-
SSDEEP
768:EFgYRJja7U0OnjsZ1I0uI2yvwcygO0008QkFJm+Zpg6csKvk39Bjl0wGJbKY8682:EPw1h2ajWQ2Jm+OXs39Vlwpb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 4100 msedge.exe 4100 msedge.exe 4960 msedge.exe 4960 msedge.exe 4060 identity_helper.exe 4060 identity_helper.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 844 AcroRd32.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe 844 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 4940 844 AcroRd32.exe 80 PID 844 wrote to memory of 4940 844 AcroRd32.exe 80 PID 844 wrote to memory of 4940 844 AcroRd32.exe 80 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 4764 4940 RdrCEF.exe 81 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82 PID 4940 wrote to memory of 1140 4940 RdrCEF.exe 82
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f_000ebb.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DA7E1123E0F2CF93B483391050920D2E --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4764
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FCF86B9111B7E4EDD29CDFC69C0A4B72 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FCF86B9111B7E4EDD29CDFC69C0A4B72 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:1140
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8DB1BC30985153BB3284B91461CE2935 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3120
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=843409D6358DFBFF60AE40AE757BC748 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2816
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=69CC07187F5B7FBF363D2B7324E5BC81 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2176
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8D1BF9CAD20866A528F11BB33BFF5BED --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8D1BF9CAD20866A528F11BB33BFF5BED --renderer-client-id=8 --mojo-platform-channel-handle=1872 --allow-no-sandbox-job /prefetch:13⤵PID:2052
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fra1.digitaloceanspaces.com/grudetopedoform/paydocxportalx.html#msdynmkt_trackingcontext=b30937ad-f680-48fd-a5a0-13747e22a7d02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9c3ee3cb8,0x7ff9c3ee3cc8,0x7ff9c3ee3cd83⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:23⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1416 /prefetch:83⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:13⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:13⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:13⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:13⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:13⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5260 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:13⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:13⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:13⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3216 /prefetch:83⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4877907833692245783,15886234492354007789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:1112
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a024cc85261313fdfc6281a0d30630fe
SHA1047dd1a5f7f0302c72f1a33c9306ef3168bf877f
SHA2565b56f40b284b0b9857488d6f8d99d6c16a3ea00c9cfadd5d32bc70de35c80fbf
SHA5129f18b535a943f57a8763f81f9827f470b2ebe4472294dd31490797d3a28e7d930ece2d9ea10159e9ab322b312b8ec91b00100fdc85998542b1d8f3190751952b
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5ca42dbd85ca01b357a35591ef7804169
SHA121a68dcea5e0d2246b3e808f56510bef0dc1fd5b
SHA25696fe4a0160415de82110afa42050954b78c795623f53c587cc2c5a1437c28757
SHA5120ddc72371d9fc24edfba282e6965ce6cb34368f8db7eaa123be6380968d969f687aa4906e7f61703cd86313a883f729c56cd2d42c1afb86172f38de043899bb7
-
Filesize
152B
MD5bbfb66ff6f5e565ac00d12dbb0f4113d
SHA18ee31313329123750487278afb3192d106752f17
SHA256165401ef4e6bbd51cb89d3f9e6dc13a50132669d5b0229c7db12f2ec3f605754
SHA5128ea206daabc7895923f3df9798bfd96f459bf859c78f3e5640fad550678b5090539f2a1b590883cd9797efee999acccac16d499772f61f5390e91bcc44d60560
-
Filesize
152B
MD59a91b6dd57fc9c4880d34e9e7c6b760f
SHA177a09da6ef4343a8b232386e000cd2d6b9fc30a3
SHA2560170297f0103d4e415653f86dedc31b0827580042f86862206fd3f6f135b543a
SHA5129fc3b9be931b3edebc4a6809d62d805046bdceb4c27a7db21cfbbcb0e5e253ab529c54d64e465e60904a6ab3b83156e26b97f852c9526f46f037944f806a7f0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD59bde9e2b3d13dd0004845b7833ebeea9
SHA17fc6087ae12fe43f308294ae0868216a37d5ab85
SHA2568eaf25edc6d92e1804895cb6f00bfda07bbc723607b5d955a0982f73cc60ce6b
SHA512f8717eaedb029569ff0829bd82fa50fc1165dd0e0a559d919c90b048cbbf78c13b45116ad410891819ef3b24d8d2e04b41c34150606ed4bb842ebad605c3ef64
-
Filesize
1KB
MD5b22d763e403a4ac0a4e4d8a791f3e8f1
SHA153a26a47d6a664e8e6847315045baf049d82f53e
SHA256f828b4b9717811376bc93cd3bba369404bbd0ed7f8729d2f30c5d2d5cd8e7335
SHA5122694137132483aa80264c191817bc0369925e7d6f2803906d488701d0732001ae652d92f8c302303f20e30c724a0efff22172a69e1bb715e1552930872b924e8
-
Filesize
5KB
MD5cdfa5d64c3b101d2f0a6326e6c58aa70
SHA15c95b572608b48eabba0d3325f60f8d8bad5870e
SHA25623a172a0f43834483700193207730faee97f52fe6fcb2adb264cea812a8791ba
SHA5121402bd85355a770c335fd1754098e06d0712da12fe20af7469385732d0961b8b6026dddf0ec4a9119e32cc3053df5fb055e55b71df3e11ead439be05fa7ad353
-
Filesize
6KB
MD5b6bf05a3d9b4be166771a854bb566c4a
SHA144fcae5a7c8f3a307546fddc3face27f6ea3075e
SHA256fae84969ddeecf3955b8143bc79160b91adaedb7e75af8399990abb8270b52bc
SHA512f637ab45bc1dea1d9be637cd112482c260175ba05a29a1f667ff7b83d9853d30922da32734a0493b0250111084a428020a1ee8faecd73a09557c0492bd36fda1
-
Filesize
6KB
MD51bc45c3cad5df8598d1a829c166249ef
SHA1db51ecab9a736318fed451d411cde75a691f3750
SHA256cefa0a94a6e821290113da3f6c290f47c446bb388e9adb1e0820f7ee35981922
SHA512893223efc57010affd2a5687d9b101043cc3190a07e588ebd308d1e3e0af12e975d6ceee569c95efc112bd6a343d99f4fd9291deb4e9776209b7e6570580db15
-
Filesize
6KB
MD50a8b8e3e59b2254f103b74323abbf0db
SHA1eb5209b7f7ea57ed7f6db5a9158e6e20668a3c01
SHA25655d3199904437a90002b2479680578e3209dadc613300ef2e3f8a985bde732c8
SHA5125e5851ee2058b6694cb7ef8bcd92380ee613072997625068c875c635045bad160d66312358ee8efafa4bb4ac16b6b30ca391e2c9bef82c59e3f836ecd51c29cd
-
Filesize
706B
MD5df1ae317fe25cd32b7654b73b331c570
SHA179d0dc26b0f0644fe7b816b4a1f93a3205467d5b
SHA256a3ab66365a0994c78b7c346f0f7756edab84774dba60187b15268f870ba5cfab
SHA512b979f50cfd2d0aab816a73a303a3cb9458b30096b490b7ac7809423509e04831618b1e967dd9d09e8f339adcff1393df0e6a7578a850907b73d43d7e6ce9a81a
-
Filesize
706B
MD532def2419913cb10a58b2bc517a03595
SHA1df9c5bb5b8be23d89b77089623a87091d9d09699
SHA2560ff9dd7dbf6d678d1446e8e33ab8538e75e35c95e524d61d1ddbf4148e3c79d4
SHA5120a402fb680b2f1cd1fb86599e3e3de82c6ed9ff3fbc80b719b24c294dd9a5af8fb24551e5e852d30fdfd14f3a30d4b09c35ae439023dbe4337d8244092109ac7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
12KB
MD55619f903f78beaf4355848b61a0ccb5f
SHA11a39dc7bbf2ba0887fb6db98a31b5e1255092068
SHA256722a735a0cb9c952e15498eff003ecba75588e6e550fd2a325b7a8886347867a
SHA512fe64ad754fdf7b4e08dfbcd410559fc1524ef880bc9c2f22abcf35aa20b2609b2a652d177e3196ea8b7360db9c52951fccb8ce3f0e9b573a1963ceb013d2361e
-
Filesize
11KB
MD56a0dcf7c0df646378600b0ac0b214406
SHA160c85b034210faaa0c2af5930b31e11d4dcb6a95
SHA25692540733fcc84d8be7ccba5ce01e4832130f2dd15c4e56de06e36492f15ce1f2
SHA5127870991b472ec931d56bf5fa2ac04fd7215d9179240088379533bc678e6d305b4f7c579195511dd42c9e1e1e610db1312a4d991c4ad5055b7dc821607d8bff0e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84