Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe
Resource
win11-20240508-en
General
-
Target
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe
-
Size
894KB
-
MD5
4041b320d06536947511ad4ab99baeaa
-
SHA1
4e2362cae86d98a520a6b4a300302ae0d4513510
-
SHA256
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150
-
SHA512
709c40f16ac918bd6fdb9aa82f213aa154c55208cdca755f640152ea4abe85ee9997489778f31b93948c226682cfddf9c0598ef54812327a0f60a737dd729469
-
SSDEEP
12288:kqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4Tz:kqDEvCTbMWu7rQYlBQcBiT6rprG8aAz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1188 msedge.exe 1188 msedge.exe 4684 msedge.exe 4684 msedge.exe 1008 msedge.exe 1008 msedge.exe 2144 identity_helper.exe 2144 identity_helper.exe 5204 msedge.exe 5204 msedge.exe 5204 msedge.exe 5204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1696 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 82 PID 4400 wrote to memory of 1696 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 82 PID 1696 wrote to memory of 4616 1696 msedge.exe 85 PID 1696 wrote to memory of 4616 1696 msedge.exe 85 PID 4400 wrote to memory of 1008 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 84 PID 4400 wrote to memory of 1008 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 84 PID 1008 wrote to memory of 4680 1008 msedge.exe 86 PID 1008 wrote to memory of 4680 1008 msedge.exe 86 PID 4400 wrote to memory of 2872 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 87 PID 4400 wrote to memory of 2872 4400 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 87 PID 2872 wrote to memory of 2556 2872 msedge.exe 88 PID 2872 wrote to memory of 2556 2872 msedge.exe 88 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 3048 2872 msedge.exe 90 PID 2872 wrote to memory of 1812 2872 msedge.exe 91 PID 2872 wrote to memory of 1812 2872 msedge.exe 91 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92 PID 1008 wrote to memory of 4832 1008 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe"C:\Users\Admin\AppData\Local\Temp\1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9d4646f8,0x7ffd9d464708,0x7ffd9d4647183⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8380446798560607735,1570235606135787797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8380446798560607735,1570235606135787797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd9d4646f8,0x7ffd9d464708,0x7ffd9d4647183⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 /prefetch:83⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:13⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:13⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:13⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:13⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:13⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:83⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:13⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:13⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9646330872986876219,7411397392254045068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9d4646f8,0x7ffd9d464708,0x7ffd9d4647183⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9301831224471421115,11201901016546711588,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:23⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,9301831224471421115,11201901016546711588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD51cbabcefc3626d372b5c3562b5181bff
SHA187180ddde14f7443f5bfe045004d63b5e436b030
SHA2568fc8ff79dd0f15a1d94910884c29d3344aa7dfe23fe5f694077179413ebf3bd4
SHA51211897c7dbe342342ac50ad069be2ae3aa329f89911fc4b22b0988100a176316087d20ab72f3ddf9c1e756f6f4f4e2e152094820b58dc83e010779ccc606b42ad
-
Filesize
2KB
MD597948c4b718e0ae62865fbb77d97a309
SHA1687c675e9b4b042908d7b0a1f9f3b12c948147b0
SHA2563b0c15f54a120a53c381a1592ba726173400c738390234784909e20ad5b7da2d
SHA512cdb358cd18783b0073e103054c644a725f4034dce1f4a55d0e6c660c320047d2ef457b75f62efb0426d82e223ab3d88f8ce0baa2f5c4cdae4798872aff84767d
-
Filesize
2KB
MD5e0950b61f0e6f54b9df89c3c580eca05
SHA1fef2e272149f997050feb63394be15053a119d9f
SHA25601883f2a32e150b84ba6bbcb332933a5d6ae04a52a566c8d613c43238414785f
SHA5129429910bc275c199cf0ce4401cb16d258a8a5261fec4c2e608b5dcb7629b7900916d5638f04f32d2e3743e7da5fd25308fc34b33f170d631705d8c3a48a7f001
-
Filesize
6KB
MD5a0833fbc02a4241cc34de9e1142e8c0b
SHA1589c6535ab62ce90b3162c9d59d8eee9aa05a5c6
SHA25664fe2c6783f4c9f2af3b137b38de623b78d127978ec88cb064b9996829d73e4d
SHA512866edfcfae900b17d017d9694d35414822c79f80164e5ccce88889e3fad543b28eeef02c218af3c7aeee86d70b9ab3fb0de5980876367c64f85b135afff821d2
-
Filesize
7KB
MD5146a79bec1b2c1964678519af53d31b1
SHA15653b971daa32cf03012a337ef67f88e39ad8c27
SHA25639d559be5965121aa70cdcbe9cb5725cefee6a29725e30ff522db76e82e036b3
SHA512dba33cb845fafad0f58ac62ef98b2a62a46764552002d1c682ad689f3ec3c0cce095c0a77b23f12a1ca44c86747e41ad8fbde61431ef811ea3c6230cc9382007
-
Filesize
707B
MD5d41582e25f19f75363e7886962b3b925
SHA1488cb1ea78cbcbef7968011e687b9c545caac5e3
SHA256a30a6d889e226729df88ca1413aeb631286b31ec57fd4789e19df5fd00d5a4b2
SHA51202c74f5a41938d7946590c609cab60994b480d34df51f3e9cb9151df4016db3faecb090f15bf54061b5856a1fe3547eb516cd9b2af64c656730f445713d79216
-
Filesize
707B
MD58fa14a5ac0edd2b925545bb5b74b8a5a
SHA16fb4c91f9d2752c6a9947e64a58243cf1e65d60c
SHA256cd49fa3c4cddb572d79b090e7eb6406fe1508c4053cf8fd46b545662a1ba6e0a
SHA51234748921b3b41db16f26db71284cea343a266e95693b8d4074a1e3290962d74ccfd0cda31a7ca05209558b4eb873a83ea8562cc8c2b5a21fe7c5ab7118a0aaf0
-
Filesize
707B
MD5a0ed0da23f8b883c7fb7762a7834ad46
SHA18d0a651bafd7ae85a2b1c7d75562ec50c03960d9
SHA256074801f834b2104b04778616f8cfa2cf32b299b9916663f7140b34e30358304a
SHA512c07e66fb7003d4888d03503b013fd835341aa4d78d59e92369e77878a340fd3ba5e514fb28a93b5e5c7aead35a9b72b98a47d3e4c4017ba51464237964ae0359
-
Filesize
707B
MD501460d91b9407553727c00f6498b0b91
SHA1a953a1adf5caf1c99a4da0788f3aa5a61b41b17c
SHA25602a8fa15d3d71f59a682b9e5d66ba857fbeb42df13a22583fb3e065e833bd18c
SHA512fcd423717e3cacd79d64dba864adb6fca814398c163b2c45aad4f6b75e4eb7c700dd9da9e109566824c909464a9a5d89c7a33ba966c2fa89217a1a897478d018
-
Filesize
707B
MD51ed0d2da1c7aa896d7502da3c761f713
SHA17e55dc18911a71a9a147de9636fc3187aa19fa31
SHA2562aa5cf6b31b529f930fdf275cf8b151db6dbe986165b83bf2d06231b8fd55171
SHA512414bebbd94cf48545ce1b6617b429c186548c8578c89f4f507a916ad95593f23d900fec63d22a875ef650fe6ecb6a83b334eff98bf46d8161df441d69121b72b
-
Filesize
707B
MD530e59abf74bc1e29c78e70bbf045579b
SHA1244decaab7560ccf36c235a60c075c4488705c86
SHA2568159c524dece7b1b1e6c38cd11179ab9bb457ed14f0f12b4499667bf1e817eaa
SHA51297ad01e66d5b3a1279ecd81b27b7ff8e408013559f0080ca0c6208d65d1407762626ff466ad1ff3b304bac98ee17717652b5bb62b59ccb1297c86fa25c93b01f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5b79147a93add7ed6ce1f2be1f6cb607b
SHA130ea1ff218a2c3b665b0ddbfd45a9e55b29dc726
SHA256a9ba02a2940eb1c963360c80a0832d79d12ff1f264c1858d57ed47ece9dcefe9
SHA512eac1d7ad17d07c3ff5478e658ffe338373ceea1b9d5d45c46d8bdd2a28b842715727d1deb2f40c60acc289e029a701247d0f3dec59655c583774758bd2bde20b
-
Filesize
8KB
MD56afefe59ea189966d7e600a6abe5a910
SHA10326c2d42144f5c221eaca807b35fdc82b71ba6b
SHA256b42640470aa01cc0654e5568731bf10ce351c050fb3f1bfeedbf22512223c2be
SHA512aa5c1970e10d256feec6b8cad40ff11288ba90ad28eaea229090ad526140742a6f982cc65ee74fe3d1aeecc309790190ff92c53f9f98d7b67839a667851c774f
-
Filesize
11KB
MD5290e3881ded4641a67eb4fd3699dd66b
SHA1f03fd43c27dd3fe3f3ef7528d2826e7667c4c372
SHA256155a403cacf02e2e6441c41f89354ad161a9d5dbedcc8acfbe583bb583b1dbfc
SHA5123fb2903680f73935158ef4a1eaf5890af920b6e798901678ebbdae8e62c2cb6033a0b1b7bae4788234d088447ab870b8fdcf687a29820d0576fa0b00f78509c6