Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/07/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe
Resource
win11-20240508-en
General
-
Target
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe
-
Size
894KB
-
MD5
4041b320d06536947511ad4ab99baeaa
-
SHA1
4e2362cae86d98a520a6b4a300302ae0d4513510
-
SHA256
1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150
-
SHA512
709c40f16ac918bd6fdb9aa82f213aa154c55208cdca755f640152ea4abe85ee9997489778f31b93948c226682cfddf9c0598ef54812327a0f60a737dd729469
-
SSDEEP
12288:kqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4Tz:kqDEvCTbMWu7rQYlBQcBiT6rprG8aAz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 4648 msedge.exe 4648 msedge.exe 2644 msedge.exe 2644 msedge.exe 1648 msedge.exe 1648 msedge.exe 2368 identity_helper.exe 2368 identity_helper.exe 4652 msedge.exe 4652 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1648 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 78 PID 1468 wrote to memory of 1648 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 78 PID 1648 wrote to memory of 3184 1648 msedge.exe 81 PID 1648 wrote to memory of 3184 1648 msedge.exe 81 PID 1468 wrote to memory of 892 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 82 PID 1468 wrote to memory of 892 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 82 PID 892 wrote to memory of 2332 892 msedge.exe 83 PID 892 wrote to memory of 2332 892 msedge.exe 83 PID 1468 wrote to memory of 888 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 84 PID 1468 wrote to memory of 888 1468 1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe 84 PID 888 wrote to memory of 4984 888 msedge.exe 85 PID 888 wrote to memory of 4984 888 msedge.exe 85 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1352 1648 msedge.exe 86 PID 1648 wrote to memory of 1008 1648 msedge.exe 87 PID 1648 wrote to memory of 1008 1648 msedge.exe 87 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88 PID 1648 wrote to memory of 2412 1648 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe"C:\Users\Admin\AppData\Local\Temp\1566e19e6c922a2b360eacedd73863f75bd8ccabb776cdca6f38aa98497e2150.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffcfa3c3cb8,0x7ffcfa3c3cc8,0x7ffcfa3c3cd83⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:23⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:83⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:13⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:13⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:13⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4428 /prefetch:13⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:13⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3484 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:13⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:13⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:13⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2928 /prefetch:13⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5412 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1732,16300840472045525022,15783798686924828751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:13⤵PID:1328
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfa3c3cb8,0x7ffcfa3c3cc8,0x7ffcfa3c3cd83⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,17057475623973860987,1455745282428296701,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2008 /prefetch:23⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,17057475623973860987,1455745282428296701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffcfa3c3cb8,0x7ffcfa3c3cc8,0x7ffcfa3c3cd83⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,912942496455195695,17233806152813184503,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2032 /prefetch:23⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,912942496455195695,17233806152813184503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f2eb94e31cadfb6eb07e6bbe61ef7ae
SHA13f42b0d5a90408689e7f7941f8db72a67d5a2eab
SHA256d222c8e3b19cda2657629a486faf32962e016fc66561ce0d17010afdb283c9de
SHA5129f7f84149885b851e0bf7173c540e466a2b2eb9907d8b608f60360933328cc75d9d1b63640ea4ecc1e64ecc5dd7ee74d82903f96a8b4418ca56296641a8c0703
-
Filesize
152B
MD5d56e8f308a28ac4183257a7950ab5c89
SHA1044969c58cef041a073c2d132fa66ccc1ee553fe
SHA2560bc24451c65457abc1e4e340be2f8faceae6b6ec7768a21d44bcd14636543bae
SHA512fd5798559f4025ec3408f5550b8671d394b1ec83b85fdac8c005b0cc3e183272bdd07db15a156a572c9c5e5798badf235dc10aae62a052efa8dd9dfdbdca8189
-
Filesize
5KB
MD5f456f416c453d3b50ea6f1c9a717dc73
SHA1dd3202738893ad554cbd96516be88e0e6970ae7d
SHA2565f8f99e8e5e50a7a48c844594c1bfb3e2fa664d51113d25d8077bac8cab8f716
SHA5122ed71b7ee86cbb45eaf14b7b130ee7383e1b7b123015b56c1a18a386a22874fa593ff2a5d748fb4dbe582958115d8e364d9a9727d1def63619fa90f92a5b239f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD52f7568edb07ab00d1e1b9101b58427ba
SHA1f76ffc4c769387652be6e6f88a4190ff6e7bf573
SHA2560b7b32625ddb79a0f7c69608dbd63fe67708681b4da4ce79e60b25353da13a35
SHA512448609b1e1226e75696f026225b24b3858caf053a2ee8974220275ee7496fe8ba3557f9ea90cd6d87ebd1c34be68f7f906164dab1c710547045f6c3619a45135
-
Filesize
8KB
MD5eb39b2df486852f5ca2270bc32dfa1ef
SHA164cc11a8907ebd95c350ca86a7be5b4c16d20338
SHA256345afcf27ddb7bcfbb9bb3cbdb8667253a38a60c0ef94bd783b382b80c48b404
SHA5128cb1d38c5a82319e0c0c1b932010c3e6a92264baf0d0acf8c0ba3912def3657c4173594b45f30e1562d4c85ce007f86c95516ad15d9b06a893415a9490299ec6
-
Filesize
8KB
MD5982c81b34c0f9b6c60ed125c884a251d
SHA11e07451bc4f7fad5a1f1be95663eb3489d1b12d8
SHA256349552e5c999ecf586bbf153bca04d7d00dbc107738aa5284a82332ea46c805c
SHA512bc9b173891386c64e28698d2ff7b750976fa1bb9416da23da93bf5b1afd714d9ab9746e146672da69caf696c8cb2115ba0531b6708e03cb47e16c535081638f0
-
Filesize
8KB
MD57591b4dacc1a55d96d899d72eafdfa61
SHA1572e71fa4690795b1c1853645a4247e549f1e3da
SHA2568ebe435aa0855cdde37c2ec6b45afa0873408a3fd5a02714b1412b793791e8af
SHA512075f189ed8b4c40db770ea2f4676f5bb80b02ac802e7112ec6264ad1be999804b3b68bdca851b7704f7030cffdb8b0ef5d711c402dad318fad9c7c1e5879014a