Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/08/2024, 15:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win11-20240802-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 50 discord.com -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-131918955-2378418313-883382443-1000\{EDE3D118-DC90-44BC-A84D-0D5C359185B4} msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 150387.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 1020 msedge.exe 1020 msedge.exe 1864 identity_helper.exe 1864 identity_helper.exe 2828 msedge.exe 2828 msedge.exe 1056 msedge.exe 1056 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 26 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 6028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6028 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 2984 1020 msedge.exe 81 PID 1020 wrote to memory of 2984 1020 msedge.exe 81 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5632 1020 msedge.exe 82 PID 1020 wrote to memory of 5060 1020 msedge.exe 83 PID 1020 wrote to memory of 5060 1020 msedge.exe 83 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84 PID 1020 wrote to memory of 2616 1020 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff37953cb8,0x7fff37953cc8,0x7fff37953cd82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4708 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3512 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7032 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6960 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6880 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1892,164577649844795684,10321038698897335984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6964 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:6028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e681bda746d695b173a54033103efa8
SHA1ae07be487e65914bb068174b99660fb8deb11a1d
SHA256fee5f7377e5ca213c1d8d7827b788723d0dd2538e7ce3f35581fc613fde834c2
SHA5120f4381c769d4ae18ff3ac93fd97e8d879043b8ec825611db27f08bd44c08babc1710672c3f93435a61e40db1ccbf5b74c6363aaaf5f4a7fc95a6a7786d1aced8
-
Filesize
152B
MD59f081a02d8bbd5d800828ed8c769f5d9
SHA1978d807096b7e7a4962a001b7bba6b2e77ce419a
SHA256a7645e1b16115e9afec86efa139d35d5fecc6c5c7c59174c9901b4213b1fae0e
SHA5127f3045f276f5bd8d3c65a23592419c3b98f1311c214c8e54a4dfe09122a08afb08ab7967b49bd413bc748ce6363658640bc87958d5e0a78974680a8f9beadf44
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD53e482938e0f053506cf17a014910af5e
SHA1c3e75ba02b955c67487382e4a44aaeff14c1feb8
SHA25695a11abc3dd1145a8f0e37ea8ad02df46799fb40afd46a3e6a53202f026b0832
SHA512f62985ec152ca3f8fe04e227c978a953196dfb2a0c0f42e66c5b6018591f8f8c0f5dde932c6fb5410f7e18a3af88bad6ad922a24489dda154cd5973996a23ca1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD516b845d003d43607c185f18b20c4e03e
SHA158edbc77e99498f3afc050f6a2e5a9584d2d0785
SHA2567458f68557b412c5387c27cf9fe3b01fa2443831cd2073d368109e652558a9ac
SHA512e11e51ff67d8151894dd3a8a34e4085bc29a9ef5402aa6a98706083d7d1cb0dc94a9a475eb283d249dc0c6be26d1f87941a495fcbf8f1ea7da34af41e6ee75be
-
Filesize
1KB
MD5c0d99259ca931ff2ef44f3db6451d105
SHA1badd73d5f4d35590428f9a4bcc96ae2bd8641981
SHA25666769ac5b9e122de1c8ab5a6c9a99381d90bc4929edebc5729ca55e71b4bf144
SHA51289666b47a77ae837fd070cd265406decec6ecbb49c290f0a5b07dca7e1c9854a05e0a15c786322cc4aab0ab828a1603d137404e12d840e9e8702886b381b4804
-
Filesize
1KB
MD50709fb7b2b063275c73068497800e556
SHA162acb55c1441638d6af874eefff378615fd223fa
SHA256a6e12c97ef22fd749d63535cc416b3b20ffaf8f09b683a9a53b91b3fcb945c03
SHA512395f82b935a99cb3edacce27b4de6e99b6532aae9c84e7823994c2ed9ce1f42363e9fc6c02bf7238a39f2bca86a3bdbdf2d6a10c05d1dd2ffe82f39dd21fe09c
-
Filesize
5KB
MD5855b142a9cba3817364ff396ecde14aa
SHA10a45e4efcee6cae79eb22543235913a5837c133b
SHA2562802c7af1c4237d86555bffdd4c7fbe4fb901b546743801fcb8e1ff4404fccf6
SHA5127b6b761800ff1b48746ea3271e429227f23667374f058a0b943e85127ddba74353089b182ccb2af44d4abadc15f484fcab556cb94b2ce7b5e5d7667737e28adb
-
Filesize
6KB
MD5801d7bef8d66ff4f85e34840cbfbf82f
SHA1b13f7b2084a89706da07f154be0d4921c4a37a8f
SHA256dc16ea5b118d45b7e1d9449f505b9edb508c5f3dfd1c2e84176dbff26f380de5
SHA512a8f3b0a4ee07e5f4670067039615b8975b98d920ad4324db62294530bf977c89486295b6c866231b2790b58c279c9dc952e9d42d84697d6b0dfb2f9274146aff
-
Filesize
6KB
MD51067169817282b3ac235fda2fc3f8dad
SHA1fe2b214054adda019c0f4fb225d70a913add5e82
SHA256d3d52d17fbc021e56e8acc0d81f65f86b6de01ee98efa86f475a35b30ea18f27
SHA512dba5f4dcc515e3b221ae9fd150a8f2cd818aea065a27471776860250f2b1e06d5af627625e3b776b7e47a0683b0e9811cc282f55fb3437a8c9445d484a20a0e6
-
Filesize
7KB
MD5f3974709bb873d322e1f1217adca225f
SHA146508fed1005b71e9f05bd7263779a1b4997306a
SHA256f4e44a4c0f7e67d7eb029054d6ac2979b7824bce8b6b559a0ca0f0e3b64e1d41
SHA512906021e288fe8ee4c288ad1f60cba1adb0b33c5bd705bb929726e3feff261981f5de7c0f3cbcd2fe5a44a842ecd36446bb490913e97697c7e786efeb320b1422
-
Filesize
6KB
MD52f41cd5b0a294f0cd277c1160fc38ba4
SHA1716f31dd94c16ba64c8a923525fa713caf15bb25
SHA25651b67796e4419621211f4c724043daf0c5199588172ae6ab47c51ba1c6ef3545
SHA51228f16e304dfb3d2ea96f3d4317741f95600e86737ee762a39f1463a5ae2fab54bbd94fcf41bc6159e1b9d7ff0d4ecde8369ac4ecc816944819d5f1b2814d4aac
-
Filesize
8KB
MD5afc10e387d6bc9f3f84057b8cc5f6a3d
SHA18fae92ee61e3f710092c2d597ac13f5be6cd77ec
SHA256b01b20bc967073cb56623ae3d10e6cde6e630b57cf5fc861e800309580470b06
SHA51271ee03bdc26d29ea0fd16fdfb35ae33595d8afd3f15b759f987cc5ffeb4cc9febdb3d7b1c499af5fd1bce9138e1d815d0df89144189f69098fa75915269d9bf7
-
Filesize
1KB
MD58f1ea706bbb110a5944af7b73564a296
SHA14d2eadcb20305144bcacf96039322ea4e0fa3f49
SHA2567482ac8ab40ac99051870d54d32556e3f00bc08cc9a6cb6942cfd934c98c4d89
SHA512683a9977861a39d7f547db402c8481207327fbd5f008e2b60fd68872f144fdc5d3116cf341d5be5811fd88678060ce46f19667aaf21aceaa4a37f60aa88b0ee2
-
Filesize
1KB
MD59ea85074f4b1bdae06a6d0753b164dd8
SHA18e80bd87dabd5752abeb4c662345610b82e693fe
SHA256e9dea9ac3e3e5d9dc28ab14a6b7de4a134bc5a7ff432eed8d13533240bfc4498
SHA51225e210227afbe1c95bc99c921f551157a6f5ac651ef150bb4d5559457210c8ba2a36c7d79d30dd92509300bed5d10289b414fe52aa1bbf76539728d6e5a8df3e
-
Filesize
1KB
MD5067895b68db645ed9e152223e61fd875
SHA18b44c1a9186f34090c0160d7f1177542a947cd33
SHA256263aee48093457e261073032fc01f7022bbfa71ae4c3baf5fd9dba37951b6797
SHA512f9d2643dafdceb9a676208b3c9710ceaee7fda335c4de1085675640ce5ae3cfd341b45a2e07993d9cf8844e54bb152a88e77a59278e2d5a920a534fddde1746c
-
Filesize
1KB
MD5886777c70792aba48dd90fd24fd5cc1c
SHA179166316bc6b9b8a0b6b09081be694da497920b4
SHA256035fe273c660b1192ef1d3ac8452ca4c6a4fbcef2ef7e130c461499c5a885da3
SHA51275f415a821cf083c5bf35b4145eebd5376f5a60525a7f01dfec256dc8a2573684bfbe591170ca7f021d993c4e023d5e10d8cb70e26357238e0df24efc410efe9
-
Filesize
2KB
MD51e4c673882dcdeb508d47ff6203220cf
SHA14c4d599951a85c70389d3385b9a90954b372135b
SHA2567be5f4d7d1b350d28a5698d444c68b2fba29b07b24161469205dc0a26ffe3a77
SHA512639b2e7ed6ea5ab5af4d8642835b12558d4283970112be249a3469151d945ecb36edbc563a96353aeb99108fa1de8ce78230c1c3b3f82278ab6ed8e3d1689e0b
-
Filesize
1KB
MD58bf15c3e21767f4ff5bcf6d3f3f10998
SHA1005da4533410945209691415955c1e87a1b0ffaa
SHA2561e16fbf7abb66332d323084c7f023e43cc957f5cafc5df68a70efce38d2b5cfa
SHA512780368c7c0842511a96b6ce646ad83249d81c97549202068c218624460900a265e2fc8ebd07dbcaba462bd016fc7fe397fb00c464720a11af98f5ffb66a26d1c
-
Filesize
1KB
MD514a4822107fad51c946bc246d5b59a92
SHA156214b5d2cc2f2f6b9e13dfb733f9c76ed077a26
SHA256ac26a75a3c731816e7f996477d7a24212eda7db7c41f8a5c2ff904c4c0a82083
SHA512ccc97615e3328852a2324c6c66f7927c29ba130d8f911b0ebb1ac30ef3cc3e4ac99be3c64537df429d6fa5f3a6f17fb8813da60de097d0dfc982d07656d270b5
-
Filesize
1KB
MD501b86ab3af0f043312a98856bb17c7a6
SHA12027bb8f78525613674db79104c8e890c0024f16
SHA256b2fe1a86eb28ab36fdfcbaccb0597407c4f16445d9a502190bcba603296e8899
SHA512cd0ce18fce1ee57eb6bea17561c20f18a705784364a9e48f92a0d69466f66fcbded6ca9a4bcf5feda1162bc2990d08d2e86dac4f30305e1c3f30452b04ddf23e
-
Filesize
366B
MD5b1ef59c6e4c804486974f63475ae8493
SHA1c4cc09f0297a14d9c58f66d228b98b52b82aa37a
SHA2569af82d25da4b5186448d9c35c0d0668f1b67c7bc93226d31b58758d27bd2497d
SHA51283f54ba7873a86263dbfacbe88b17f656fa3398dbafef913ccc45a6e4312d7d29cc66864f8465ebef4ef16a4c4abba38a4d6001188636eafe33e5845817d3416
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55a177cf98f3d1f06572c78f8cde10314
SHA139d73470fcaeec7d5b63f02cd4dafca1d3271b9c
SHA2564029038ac825cd9a43d60768330aa56df3a02f0a66230fd9842a6c23205c0999
SHA512d81738f2a41915e6dccc1729d0eb34204966d650e789b0fbfc81bf26241f85a67cc5a7781fd83408ec6f9d351460bf71aa00f79299df103f30ea982bdd7df931
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98