Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 12:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://btcusa365.com
Resource
win10v2004-20240802-en
General
-
Target
http://btcusa365.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{9FB7EBC2-5073-4F0E-B0D9-679EC8EB41C1} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 4624 msedge.exe 4624 msedge.exe 4400 identity_helper.exe 4400 identity_helper.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 3668 4624 msedge.exe 83 PID 4624 wrote to memory of 3668 4624 msedge.exe 83 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 4292 4624 msedge.exe 85 PID 4624 wrote to memory of 3576 4624 msedge.exe 86 PID 4624 wrote to memory of 3576 4624 msedge.exe 86 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87 PID 4624 wrote to memory of 2816 4624 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://btcusa365.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe95c146f8,0x7ffe95c14708,0x7ffe95c147182⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1441116528063852198,16684039381279689375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:12⤵PID:828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
69KB
MD524a806fccb1d271a0e884e1897f2c1bc
SHA111bde7bb9cc39a5ef1bcddfc526f3083c9f2298a
SHA256e83f90413d723b682d15972abeaaa71b9cead9b0c25bf8aac88485d4be46fb85
SHA51233255665affcba0a0ada9cf3712ee237c92433a09cda894d63dd1384349e2159d0fe06fa09cca616668ef8fcbb8d0a73ef381d30702c20aad95fc5e9396101ae
-
Filesize
41KB
MD5ed3c7f5755bf251bd20441f4dc65f5bf
SHA13919a57831d103837e0cc158182ac10b903942c5
SHA25655cbb893756192704a23a400bf8f874e29c0feee435f8831af9cbe975d0ef85d
SHA512c79460ded439678b6ebf2def675cbc5f15068b9ea4b19263439c3cca4fa1083dc278149cde85f551cd2ffc2c77fd1dc193200c683fc1c3cdac254e533df84f06
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD5027a77a637cb439865b2008d68867e99
SHA1ba448ff5be0d69dbe0889237693371f4f0a2425e
SHA2566f0e8c5ae26abbae3efc6ca213cacaaebd19bf2c7ed88495289a8f40428803dd
SHA51266f8fbdd68de925148228fe1368d78aa8efa5695a2b4f70ab21a0a4eb2e6e9f0f54ed57708bd9200c2bbe431b9d09e5ca08c3f29a4347aeb65b090790652b5c4
-
Filesize
447KB
MD5a346a516abb65d888a021a1ab76dc218
SHA10790ffe714617081a77b0d406539ebbc43f68bfd
SHA256c109d5f335da1b9acb233c3e407a4afb3ef7fb5e93247342f93e1a72a52a570b
SHA51277fc4c54c12b43d807cf3c39bf07f802d2f789de874a98f87ad84d506414baaee064ad667656eb87a2ce9cce1c44fcd64a135898353d7dc3a064541d378f8b4b
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5144a6a2a814987cc9557612e589820e5
SHA1d349b83aa09e2c51c6d80b8545a4a2a264bace22
SHA25699c7eb2db5e01f91a520eb29e95800f0abf88095436baaaa0694e6fddc35db85
SHA512575b0c8cd482aeba110328a66c695c15351c4286912b90ec58cd5c00e5165e3973d882d6e70a7b727bd987d820e075cc88b739c521b3aec88c979e6936a6e5b4
-
Filesize
3KB
MD5e8b48ecaf57ae224ae170ac32ece8fc5
SHA1a4b946d1a28367d2e8a120b53439ff50199f1325
SHA256bc1c9c34265eba3dafb66e6da2a169506d0d9b399dcce722089481143300e8c7
SHA5123eb31252c77fecc40dd2b32e2527acc8a597ae2aff71710329e307b36d6294ab5a06427c1d88851d97912937e11bfe2aadffe2be2f6635287687446d8ccd8067
-
Filesize
6KB
MD5e27f9bce895673911e3a04f5c24e0015
SHA141884ce1c42d95392734286a08949edf203a1300
SHA256c824a41aba21e97f93b886c306824e049575ca59d136d1e2044d3179dd96b2c1
SHA51290cbd07b1eb7c3158725ca55d9ff1cfa357e1c32586e6b892ee65d222fe599ccd39f9ca5ff42c64ff5f2c553ea720693a6715d06789ccd8df71646f5e2a5bc72
-
Filesize
7KB
MD5f73aea9aedff309c10dbb1e060279686
SHA18c4eef6ee2c0c9516e3ea54eb9824d5415f06e04
SHA25665fe1cdaafc924ce12305552257d972d72dd1ba59a5b2d3dc37babeb8a5a1b2f
SHA5128b93649610477704971b6cb8adbf02d88edd6755acaef36a4dfed891bde5662662fe84708c5b916b67814abd88501b8bb5a4242444cef7b7411c38a6f8b666c9
-
Filesize
11KB
MD59bcc859b662d97659cdbedc5dd5f4295
SHA11a5be1251070f86b5e5bb1659e1c9563a058613e
SHA25630a04f401cf3f3860bde8b891bdd332e242c093d685d7b89219370fcc554a1cd
SHA512400fa38ba8168417d12a9a74dd2ceffb8a1751d99b12bd3ea040a4e543b4e0d086a823323e4b7958649e2f0f0d7b859a84a08a26d23131545445aa6ebf0d1736
-
Filesize
8KB
MD5cb280ebabe4130e5e0f6cc39483380f9
SHA1039c23892269abf448e2fe296434cf207a1e3963
SHA256d5157b71b3ff7a6c7371f24c794d6044334e283ecdeb51a37415ef22c2746d05
SHA512d360d979fbf904c896b682335d8c4b6e117a9f3aaf06c2664eecf0ae190c44267c9adeda9ae897184fc3fd8428c3d6664fbbefd3428350dd9c81b9e5eb9fea38
-
Filesize
6KB
MD5d5a5b2fa72e34471ff63d5a1816bb522
SHA107f4e4f97f7d13237e242a4c5153a1a8eb71cc7d
SHA256d1518037bc07427dc8953e976ac6e8c53dd9b9a22c87758beb59853b4e1cf1b3
SHA512ef2764db2b26ce7681129d4cd2fd245b14c25b8e25032e4f77424fd819c5c838f1b384991a8ecabb6129b03f2afb192c75671e97c28f3bc0c4b42b211c3e57b2
-
Filesize
1KB
MD5802fdd3adcfc0c3b11e953b84a2dde5c
SHA117c28397fa5230a14fd9867d2a1b71d4ca635b21
SHA25643469079a7d111e4e3ac35847073df029e6492c3cb5166ced9d52d0478ca640d
SHA5128453fe740838da288d85668e6e0300e6aaf39595972f915fb2c0e8d8c0f2faf2dedf629515c711838753dd3e712cde2f5ee6b7cc2c2bdaa61f39f108a1e89dcb
-
Filesize
1KB
MD563fb55ea9fba7165aab1949b1afe761e
SHA1437e1f256bd096de81c86cf765e26bdbc23fa98c
SHA25644ebf91cdcc5239d2393655e87b4a77627f1a8510a812475995225c7e3154f2c
SHA5120675254cfb95db7c38c1525acbc6da3ec6b0073aa3f234bd3aa3613aefc5ece870d8a542e364bfcb8f8753d733d1d4063737dd77454051eff2cbee08aef2db47
-
Filesize
1KB
MD54a283df5cbee0dfc7b8a2c5f605203b3
SHA1d54a3eb0a689b964dfeaab2388b8bb8e073b8868
SHA2568d49c9eca9737702532a93bb9992f7150081b3ef3a9ca16f4f85a3efc73b3055
SHA512d5716ec82d4d8907677685562ffff3f6a5b1d8b11632d70dfcda1d66b361bfe29d3539f87714aff6b3fc0d5a02364367aefeb99f4ede041c3bd0ad51fcd14e87
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5da5c67de5aa585a41e117b704b75eb20
SHA1e86a74c8fe80c2411d7a531077d8ea6b37e601b9
SHA256341733a904a7803b67b50a39674856a400e57d15aec80daf0aeff69279d7ca4a
SHA512aa0dfaf0f1a418d5249c0f87c9d3d593a279540692ebee946b9b23e3fcdd8f391597b79356a2d4a2fe91ec78095c5f99e42d96d3d2d2457100d5055c6e9cd5a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD5f60ea9449704847fb97570cea706c35c
SHA1f1b96c113969c5d42c6bd6a449abd43defb9ff7c
SHA256c5ebdcb86f335682e8348516886cb6aa9716a8c08484ba5dd4b8246ac397b543
SHA512eb5bb383401ed7e6133920a77aa7d8917ecf60e85137a6469102814ccdc2e465fca13e87e9845ea239b6cf2630451b929f7f0da0eba1168448b90e9ed386122c