Analysis
-
max time kernel
45s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 21:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://expandera.win/expandera.exe
Resource
win10v2004-20240508-en
General
-
Target
https://expandera.win/expandera.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 440 expandera.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{3B526F01-4EA1-4F80-BB7D-9536F68F426A} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 632311.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 2684 msedge.exe 2684 msedge.exe 1236 identity_helper.exe 1236 identity_helper.exe 2184 msedge.exe 2184 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 4824 2684 msedge.exe 82 PID 2684 wrote to memory of 4824 2684 msedge.exe 82 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 3360 2684 msedge.exe 83 PID 2684 wrote to memory of 4208 2684 msedge.exe 84 PID 2684 wrote to memory of 4208 2684 msedge.exe 84 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85 PID 2684 wrote to memory of 1000 2684 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://expandera.win/expandera.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6600 /prefetch:82⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Users\Admin\Downloads\expandera.exe"C:\Users\Admin\Downloads\expandera.exe"2⤵
- Executes dropped EXE
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1828 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1688 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6816 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3996087266016441576,15747948504257857774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1264 /prefetch:12⤵PID:3644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x2f01⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD59d3a8464feac60b32325511e7ff1baf5
SHA1a11e7b4b31d2a148e5e18de0d9f15d42c9194767
SHA256a574642b89131b2ad56f7d31c138f519e76daf66916326bd9ffb7f218e26e7d6
SHA512ecc0f1eaadfede8a8709c39ee0acc4b5a419fa4a4afdcdb1b373fc63e921078e6f6ce5ae73023c276a24caaafca3cd417a23f4ed049f0cf5d3a5813b09a62dfb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
5KB
MD5a3f44b94bbca1804daf46b2f72bfff38
SHA17f2081ec4c216df4f5165e441ac6a0d3a0c8917b
SHA25691207cadc8bbbafeed0fcb9ef04293f84aa6c276818cfcb84de6b8ea19a6312d
SHA512135ab0ac8d25c47737c0da2393a3e62953a1e1e63adc845070908519d12449d7ec43280d6385c8b9811f1d278545c012f92cb541ba96df40a6224fc5e77cde3a
-
Filesize
6KB
MD52e9dccb90b2c0b719db542fd7a0d36fb
SHA17d700900ec90fca84540418ccb8c34ab9469a60a
SHA2563be41a129a598ee86136d594a08eba44a337c1153467fd27be6e31c32e384cde
SHA512c7a5c6f39a4ce16dfeb449c6ba73ac7456b3a10d25d7612ebc3e1f1c69964ad0507949cc6e7d8288699dad5277896475dfe123e492a4a444c41dc2feb2660e7d
-
Filesize
7KB
MD50ea0b6b0fe8b0a7e357b2469c49ea5d2
SHA130cc8c954d2b1e6d5ae30cb9d407c69621de325e
SHA256b458ae1210f3699c003e48d7283397cb4a226b8e5558264522db4900e851b669
SHA512806a3eedea4143d85d778707d57d07751acd9f48c71e62c19c0d21f9e6d272dd5c048cd30fd6cc384ceed9b1cb159e9d8bd79f27b3ee1d487692c4184f136ac7
-
Filesize
1KB
MD51565b67c4c4a58f0022dd8ea77c953f2
SHA106ab3fee8df8608cfb5db9986e9d01a925885b70
SHA25660bae5dc6b0b16d9878c116dcd5239aaf85f69a763cdca443407a84c10db9d7f
SHA512cafa7ccd19251ae30f96f37395a1fa0d0055f268446ace6baec435a1c04bd82be8b5ed5a9615141f36845a54c2312ead81174d5e7e33b28b75a529f66e5523e5
-
Filesize
203B
MD5f33d42d76a8e1874a90d0bf3b00a1d5c
SHA1649937f27c7b8d121e58d28c6f237c4b39e10923
SHA25660343670a6d028ad5e5efd47ba73e5326cf574179ef732e98317553ee0214c7a
SHA512938d915e4a376fc09d6c8ccc9aecf1b106362ae37dfaa00d9f3e050b627eafa6b5541cf572655dc69fe60d0fdb3667a369e81db5eb73a625f3cf63fcfd5e0b12
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD58ffb174ac35a94e582cb7c7ac97ecebc
SHA136329f4d717e6f72776433ac3935452f7d6ff41e
SHA25698b4f3280af43ecdabec8211483706916719c67da984ecaf9fcb6fccd56b7a43
SHA51294eeb7f5e6e51bc802b7d842e6ea3da386082536965bfd343f7f8ba0533a00d16391aca25dd7d60572f96a9ee11e1cf29848191f72a4b015c2135c2d7d45cbab
-
Filesize
10KB
MD5fb9e66871770412e1580b21dc2cf5e62
SHA1147ef36501e4671906161abf0240e6608a992605
SHA256d1f4f6bdb8e4e873afb259928d9f65230e31ac9624a2da175efee605fc8190b8
SHA512c843c4af4f78b1535b80b5638c49b6ace1d18caba934b0d94e79e6e64745d869201096299931364cc56103c3fc437a39af56eecefe8fcef3f4756d981608974f
-
Filesize
10.7MB
MD54bb82445d753b5bdb391ac51341c611d
SHA10679d85d36e9fda20eb122612f36c23d20d5a99e
SHA25634b86edaf94815cf0970e7f357f12733aeea6e58989f3baa2da3376d477c060d
SHA512f31e78ee6bf42e1507c154b2fd9c9a00df82dc501ae0db30e946689427c03b8e10b93c3e1a199252094af8d77dfdeae43e6f7dda27b993499ee2ace1ea91889b