Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1190s -
max time network
1194s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 02:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://direct-links.org/s?vwCO
Resource
win10v2004-20240704-en
General
-
Target
https://direct-links.org/s?vwCO
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 4600 vlc.exe 4856 vlc.exe 1708 vlc.exe 1212 vlc.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 3584 identity_helper.exe 3584 identity_helper.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4600 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: 33 2468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2468 AUDIODG.EXE Token: 33 4600 vlc.exe Token: SeIncBasePriorityPrivilege 4600 vlc.exe Token: SeTcbPrivilege 112 svchost.exe Token: SeRestorePrivilege 112 svchost.exe Token: 33 4856 vlc.exe Token: SeIncBasePriorityPrivilege 4856 vlc.exe Token: 33 1708 vlc.exe Token: SeIncBasePriorityPrivilege 1708 vlc.exe Token: 33 1212 vlc.exe Token: SeIncBasePriorityPrivilege 1212 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe -
Suspicious use of SendNotifyMessage 58 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4600 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 4856 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1708 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2020 4800 msedge.exe 83 PID 4800 wrote to memory of 2020 4800 msedge.exe 83 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4740 4800 msedge.exe 84 PID 4800 wrote to memory of 4216 4800 msedge.exe 85 PID 4800 wrote to memory of 4216 4800 msedge.exe 85 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86 PID 4800 wrote to memory of 2808 4800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://direct-links.org/s?vwCO1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e33346f8,0x7ff9e3334708,0x7ff9e33347182⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3376 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,16768394207326985742,8337573956270970252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:408
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --no-playlist-enqueue "C:\Users\Admin\Downloads\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\Vids\JoinUs @RisqueMega 0.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:112 -
C:\Windows\system32\dashost.exedashost.exe {8edaa8a3-7e78-4dfe-b88781f731695610}2⤵PID:3792
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --no-playlist-enqueue "C:\Users\Admin\Downloads\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\Vids\JoinUs @RisqueMega 1.mov"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4856
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --no-playlist-enqueue "C:\Users\Admin\Downloads\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\Vids\JoinUs @RisqueMega 10.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1708
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --no-playlist-enqueue "C:\Users\Admin\Downloads\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\🖤 Breckie Hill 🖤 Only fans Telegram @SEKSFANSE\Vids\JoinUs @RisqueMega 41.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
Filesize
19KB
MD539b7e0d992290c41da06068bfbfc7c77
SHA1f6a4d0d93047d6cadf48b2bb752f89bc9bbf6806
SHA25692d3d1073c33cb7ee8711bde6ac3c519b2b5f0044e5a2582aba96b14ccfef01d
SHA512c67131ea3093c9863d3c7dffc37cf54d4b17bee7abae3fda9195535bb8a736ab19115fdd14591c7fd1966014891f9b140b8763695a80207756bf01c534388a1b
-
Filesize
17KB
MD5950eca48e414acbe2c3b5d046dcb8521
SHA11731f264e979f18cdf08c405c7b7d32789a6fb59
SHA256c0bbe530abfce19e06697bc4358eb426e076ccdb9113e22df4a6f32085da67a2
SHA51227e55525ade4d099a6881011f6e2e0d5d3a9ca7181f4f014dc231d40b3b1907d0d437b0c44d336c25dd7b73209cd773b8563675ac260c43c7752e2d2d694d4d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5136ca582c56cd68e49bf08130e63f928
SHA18035798bb5b700be74edd270e3ec671c7bdedfeb
SHA2562c7398c2f18bdbfe71c410fc02b29613c6a2e6775dbf289fef9aff81fdc1409c
SHA512c2dedf5505862cb476eb38ea4fbf084b305d95e7008c21ca37c4db6f8b9d3eab85a6bed6f88c9b262a146531e9e73c5c381aeba5aad84caf3cdf567113138920
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5a1f19815742da882237efaa22d963aec
SHA17aa57928c231a537925b4fd63ef991b914181b91
SHA25607b2ac48c3fd5c203074501ac08bbd7794df4ccf33bf6f6e29c1ad94cb2b105f
SHA51242f04d043b1ee992610fc6c2e641c81d36fa2dae3dcb22b776d024e8fb60e2ef3a0a3e279d23dd6a4dce194e8c3750dddf5c8d89441f020c561eeb21888e01a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5d1764d47af3a4bf9594755ce565b9cf3
SHA16d8e324af7383e370f9387ca3d01467561eb058b
SHA256576ca9f28aa5976d2972c2810c86141b841094f186e7b658c6359f401872e601
SHA512158b3b3243c65c4036de55452c557c7a3a6bce93f0792e88d565adcf68e06ad7719fb7ddd89e1900ffbf5d40abc876c73987d170e66703ead9566ebfb7acb3e5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD56cfcfa8595bb7a52a54049c206243f5b
SHA163fbca56192547654b58baea53494224432bc39d
SHA2569e210a620cfa9806c4b640033419902c63f3a5812803934e92a7827cee342669
SHA512b1f9bf0c84e3f513c6e3670d381b796e12179cd4762978328360cc173bcfe094003226125404b21e13b5352dd20fcfcb9277fc792f5082666b925d15565cad5c
-
Filesize
3KB
MD50f027b25fab8bb9c924fb95bb94d55ce
SHA12bdd924d0ca3d680fb664d1e2615b7972d5a2e3e
SHA2567819e3fd743ed4a2434cc920099393ca169550fe80d96206c13515c54ede7775
SHA512af00aa52540cdf2297e425bbe8e04fa9ea0960194bf5712496a05a74d35dd25650c80551bd127f4f17452a27aeff373550d586fec28eb5b53f8f84c6a7062468
-
Filesize
3KB
MD53e6c98e398672222a1895a34e6d74cc3
SHA112832b01115ff9f57d8d81496ef367ff27003c5c
SHA25614cb441d34232c4db35e31cfa2547ceccde1ae6c1d7861fdbe482b77c2c432e6
SHA51231c374a19a8a64e81e9df85b9df0522d2dbccf1edc201f5f19deaa19740cf34e06eb8ddb7f7c3e36076a0b4931c60c9f88fa89596e8924c1b391066ed6ec35bc
-
Filesize
3KB
MD5e796df566143364a53d6534ea781a7d5
SHA19d50dc20479356485ee89caef579ddbaa16acabc
SHA256fc0f90e5b4b6b639260796357a1fde6de7d9f3767ad5b58d45bc48b4a75caa04
SHA512b7e860f3a09c7b28728f8f217abf97440abbb9378589ee6d7373b87da82919c4838f948a30279b2639d2901a223eb5fde1f3650b5053456cdf0e777a336fd670
-
Filesize
6KB
MD5ea4a3819bba371d89fde3518b1829a10
SHA122e52cdbb67c88abf7f80f034eff3f1c4ecc888a
SHA256b2515072239649b369e7d5ad38239fad3dd5fbe23b62a192f8d46e26ed98dfc6
SHA5123ef25d82f532e18f46b1906f251add802381e370ec5e05797adaa21071b9a18a3f81ee54a256c89247578ed995decf4745a58669657d72953c53ff9af0993d74
-
Filesize
7KB
MD5140d9d284deab9d454eea123c64480ca
SHA15fd0e86b9639af511d87b618d36597d071caa402
SHA25660ef5784fe1382ad6c4f6e8bbbc81c019877c5d6ec53f02c1631a39544ee1d6b
SHA51267b5857667ba86067b96e4f7a5255c3b3be678ae58061a9218b2e0c021512090d414610d960dcc6be037959d775befe3d07e0223f7aaa035b5944f259b957487
-
Filesize
8KB
MD57e25c2b3feb442ee947dce40c3dc861c
SHA1b8017abc0a7b0840e570bff652d824a33d988512
SHA2569e07503d0e7c49e8463fadb989df0afd48eeb7158db2b3893315eddaddefa8c1
SHA512229af37047b763e73e259a43451669f1eb7a65e9d09d0842e75640b6ad6784a7eaa5b0fe82b5e5d7e650bd04ec66fe5195b3b4555d7008807c58674991f4d81f
-
Filesize
6KB
MD555024c8bde290d580a5fa0af9a7671e8
SHA1a887538c1fffd945086da6f447a48e51e076c794
SHA256891b03217460d68e17d95e8343c1cbf5aa56aa74e3071a9e4956376405a11f77
SHA512cc492c06fdbaa6d7b4b53ff389a2964a060ded06c7eafbee0634e04faf74876f58773abe6e0b446ac2473e3f0fbd9d61f273550fa81c094afc83346203d67967
-
Filesize
8KB
MD5567bd07b5f6ca67f9a18eaaa6952f48d
SHA13755d0a11bb5f6d1f37405fc4841b83a05c13d90
SHA25654fa2296c5340ce04af3bc108d7572da4c6656c0d6f0b263e612920af5e25e31
SHA512729613e294db035f2b2d214fa43ca58efac0e04f205ea0b6d1b01741b5d0f9e1aee6efe910d63ec270c247c1a64e9ad6c99d7bda9d90f9141b8c340ecaab654f
-
Filesize
7KB
MD55b2ab1f6f24da660d8e7142045383402
SHA1e39277b31d25e0fbf9fa072a29403b031e279059
SHA256b2e40803caadaee58573fbb8e130e0a1045001e1019dcf86d3e967876ede56bb
SHA5121bcdeafa2b188e23b2d16eed9cd7196de5d1a356c6aead6b2ece9156058aaa641c4bb5e08d863e6e4d4766e33de72f6f5d79412c723095b28e5f88c3f85732f6
-
Filesize
7KB
MD59a0c46bf94b47f0b79db60b673eb10d7
SHA159ed9c9724bb79f3a8ae84bb757b4ddd93685159
SHA256097c45d44a51df5db8e9f0663bb80644a7c5ff87ade949ab4566ee666b28e952
SHA512d0130169d2ddeac432f920571c3e83e558fe2755a1da6898e19eb15b389abd4dbb31cc72df982051170e8076eb5b54f160854c6f4c4e1327fb393faa71c5da2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f60730dc3c46104240b8ceecc35dee39
SHA18003341a10050e14c4bf54a59912983bd7b4cb81
SHA256e211e09e1ad6077c45f9a322ff878714cda7f1ac62baabbcd2e535bcb95a05d7
SHA5127e2a6ebfe88bc1b75cce5bb282f2f42e8df38d3a009bc3553bd8bf6eaafc3fc9ed7b721cf547648ae5967f7389ece8e6d69f436d0bcad4f2f164b8d073d704c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5bbbf9.TMP
Filesize48B
MD5f086e1e4a582e5a8e46bb31cf7780af4
SHA10696aa0c35f4be8dd785158dd1b4c53bd58cd734
SHA2560ee3c6ec06d233626ed18bb11ab72b002edf98e267d87c5ed0b0363b0e3b9c72
SHA5120bf5332f17dc5f615a55c7a02fd3bbe8e317734414ff9a061757217f5f757a8d4e0d8f31c3bc0c8492de5f99835eb76731a81881c896675e6ec582a0bddfb888
-
Filesize
371B
MD5c252a06b9f0aea1f62b9355e3157db78
SHA19b07486841f9f62e87ef8b1c2d4085163a00d57d
SHA256c95673e7f1706ccac5e6807c2d1418da0e5171aa8a796240477a5b5c81b58b9c
SHA5125c6d346d6fa4b554accacff9baa337380688c90ddae4495e51f72ed86b2afbf494b3d4fd18459739ba0e1bca6a3084095f3a97f7f6c86b2937687f2baddb51d1
-
Filesize
204B
MD5bbe2a95fef301a3c319a3c04836e65a2
SHA10523c64989e2f0a22a719f058dcf6f1701cab185
SHA2567fb22e2710219a733c05aa379578fdc6294f6bc42b01a29bbca2807e5af86d88
SHA51233a3ac6aebe6db6a8eaf576aae4d714e1f61be7f231a8501ad1d39862c62ce315719ea4db4244866ff40e2c333e5723288ea0f91cce7c93207a97dadcc5c0a00
-
Filesize
204B
MD5e69784830b19128045a12fc81e3622b5
SHA16427b0aa86a038bc8a24198ce3b58dc768479e84
SHA256aa4818f1dfb05be15bd7339e44a4553e55de0b63102ca317d281b71771fa1660
SHA512aaa37184a499506f4a0a147c62e1f7923cfacb765b25c3c3986c947bd07aedf0d933f5990b6bd3ac2980f453fab1d32167135130d6a4727604339d30264b7687
-
Filesize
204B
MD55349b19b0d93c669fea365e8ad2d4af5
SHA108f82f797510a74fb54f2242a7f080f446270f39
SHA25660d131529fe78721be41278f3598f1298dbefadded81f11c25e6ea65fa3cb0a8
SHA5125d6f921b0da5a1bea61cd837e5e9ecd85441d26ff98769b8ee6a47c388ab9a5627959d33684c2193d758fbaf28abbd7ca7c7a6c53fc5f53fddb34fb153f34630
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5cb6d92b20f3bea13b1d4b19cf2976958
SHA138c6712307dcb688c219e91532de7e0cd94b316e
SHA2567649a64b77fdf87a498cddbdaea0276470d82a964da1d04b032879fd0f3bf17a
SHA512e2979782c9b315cd5ef1406b10e4ef07299a5824b43dbf6938e1a1780645af87cb96d49e3b79514a0e53ae2c742ef5a0129607a2271e3b617dfb7edc247b6c51
-
Filesize
11KB
MD5a5271f8b83fa97009215912f2d60f015
SHA1822d8e0f9efc23db2dab80996b83c3c036179c01
SHA256cbe434dbb43b3a675fda17e28263d383366f664c5d2c58be675201b098aad710
SHA5123f408d88f988f96db2d75792441c83a8b3d67c9871b98e834eb3bc5ef5581986933f90e8260e709e9097ab71a09d2e51e8f082ab24b8907de41538da53139769
-
Filesize
12KB
MD564709349fde7bc0aaec08d80227e57ff
SHA177114dfc5149b4949c7778b203ab919b47855204
SHA2562977ec2e55730390335c371d1bbc2c80c54b227ca8c9ee48973f4c63aa8a6d09
SHA51281482e954caac54624106fb47c5f1c036051b208d91752c083e0aa82676fc5cec7cf5abbca986d388685dba0cbdf45da069a7ddc4568c7eb1e5c4474d762f70d
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
927B
MD5d9f8474def8e31395ee86440206e1e5d
SHA1e54a45f0f5c4378012223d898c778ea0a2079715
SHA256b2e32cac4170bd81461cf71c99d233dcf6b379d9641b4fae4127d49b074f1387
SHA5126bc333162cdca8c90242f6c742c617d9aed88ba55441b6db2e05494bc58b21f3fb96d3f3bc0b1ca762b4ea225118e69611d60dd44ab2d2b4e08a461f92239e79
-
Filesize
1KB
MD5478ee99ac8dc17470246359ac5d3b2ba
SHA1da31d34bcdd94ac57b0d459aaee9e7f814b7c36f
SHA25676c38078b7de047d2e96f6176a354fc9e56feced590d5d93e46c45512bb57454
SHA512d11f9757e0241276e66408b150ea5262dc5f5fdc9c2b71b2aa4eb012a4b414caf7c3f263e4a3701c050a87aa4a4239142176466656cead44bf410a1efbfaf1c1
-
Filesize
1KB
MD501f49290e388caacd4ae3774d60a67b3
SHA1c5970ca8108a535be882b06376027461ab1c5e60
SHA256fafde31941e399b59a884b3a33407cd9bd2d2d48254d0780e6ca359fd574d10c
SHA51272d07c4795bb355c8a5e6cb99802d5e794760c63c783bea67e92ee006126257546abd48923d33df75c814b4f502ac5dab211c21ac955a13a36e489beaef70f8a
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02