Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
4Tools/SQLi....5.exe
windows7-x64
6Tools/SQLi....5.exe
windows10-2004-x64
6Tools/TSP ...or.exe
windows7-x64
3Tools/TSP ...or.exe
windows10-2004-x64
3Tools/TSP ...be.lnk
windows7-x64
3Tools/TSP ...be.lnk
windows10-2004-x64
7Tools/WinP..._3.exe
windows7-x64
7Tools/WinP..._3.exe
windows10-2004-x64
7Tools/prox...le.dll
windows7-x64
1Tools/prox...le.dll
windows10-2004-x64
1Tools/prox...er.exe
windows7-x64
3Tools/prox...er.exe
windows10-2004-x64
3Tools/prox...ed.dll
windows7-x64
1Tools/prox...ed.dll
windows10-2004-x64
1Tools/rdp/...ib.dll
windows7-x64
1Tools/rdp/...ib.dll
windows10-2004-x64
1Tools/rdp/...5+.exe
windows7-x64
3Tools/rdp/...5+.exe
windows10-2004-x64
3Tools/rdp/...ib.dll
windows7-x64
3Tools/rdp/...ib.dll
windows10-2004-x64
3Tools/rdp/...n3.exe
windows7-x64
3Tools/rdp/...n3.exe
windows10-2004-x64
3Tools/rdp/...e4.dll
windows7-x64
3Tools/rdp/...e4.dll
windows10-2004-x64
3Tools/rdp/...i4.dll
windows7-x64
3Tools/rdp/...i4.dll
windows10-2004-x64
3Tools/rdp/...k4.dll
windows7-x64
3Tools/rdp/...k4.dll
windows10-2004-x64
3Tools/rdp/...rs.exe
windows7-x64
3Tools/rdp/...rs.exe
windows10-2004-x64
3Tools/rdp/...nt.dll
windows7-x64
3Tools/rdp/...nt.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 09:05
Behavioral task
behavioral1
Sample
Tools/SQLi_Dumper_v.8.5_Cracked_By_LautheKing/SQLi v.8.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Tools/SQLi_Dumper_v.8.5_Cracked_By_LautheKing/SQLi v.8.5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Tools/TSP Dork generator - by Lh Production/TSP Dork generator.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Tools/TSP Dork generator - by Lh Production/TSP Dork generator.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Tools/TSP Dork generator - by Lh Production/YouTube.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Tools/TSP Dork generator - by Lh Production/YouTube.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Tools/WinPcap_4_1_3.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Tools/WinPcap_4_1_3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Tools/proxychecker/Colorful.Console.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Tools/proxychecker/Colorful.Console.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Tools/proxychecker/ProxyChecker.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Tools/proxychecker/ProxyChecker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Tools/proxychecker/xNet-Ameliorated.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Tools/proxychecker/xNet-Ameliorated.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Tools/rdp/RDP Forcer 1.5/AxInterop.MSTSCLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Tools/rdp/RDP Forcer 1.5/AxInterop.MSTSCLib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Tools/rdp/RDP Forcer 1.5/ForcerX15+.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Tools/rdp/RDP Forcer 1.5/ForcerX15+.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Tools/rdp/RDP Forcer 1.5/Interop.MSTSCLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Tools/rdp/RDP Forcer 1.5/Interop.MSTSCLib.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/KPortScan3.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/KPortScan3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/QtCore4.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/QtCore4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/QtGui4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/QtNetwork4.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Tools/rdp/RDP Forcer 1.5/KPortScan 3.0/KPortScan 3.0/QtNetwork4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Tools/rdp/RDP Forcer 1.5/csrs.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Tools/rdp/RDP Forcer 1.5/csrs.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Tools/rdp/RDP Forcer 1.5/freerdp-client.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Tools/rdp/RDP Forcer 1.5/freerdp-client.dll
Resource
win10v2004-20240802-en
General
-
Target
Tools/TSP Dork generator - by Lh Production/YouTube.lnk
-
Size
1KB
-
MD5
686c7f583ea8b588077a0ce49f4dab41
-
SHA1
a66feb429902206e1b0247107a63dcea9be32f0b
-
SHA256
e18918ce19299f7ef793997d91dfc7cedd2d2691b1b28628595f026954b8ad80
-
SHA512
51f42139baed534c3d70c9e5f600de644d0b27129ff3c64da2bf10646e05a27e3008fb3c3e007c7f5cad781b6689b2699310478228dd9a1270b9b6efda969a45
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 404 msedge.exe 404 msedge.exe 2192 identity_helper.exe 2192 identity_helper.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 3088 1296 cmd.exe 87 PID 1296 wrote to memory of 3088 1296 cmd.exe 87 PID 1192 wrote to memory of 404 1192 explorer.exe 90 PID 1192 wrote to memory of 404 1192 explorer.exe 90 PID 404 wrote to memory of 2068 404 msedge.exe 93 PID 404 wrote to memory of 2068 404 msedge.exe 93 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1616 404 msedge.exe 94 PID 404 wrote to memory of 1088 404 msedge.exe 95 PID 404 wrote to memory of 1088 404 msedge.exe 95 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96 PID 404 wrote to memory of 4572 404 msedge.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Tools\TSP Dork generator - by Lh Production\YouTube.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" "https://www.youtube.com/xRiskyx"2⤵PID:3088
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/xRiskyx2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa4ca46f8,0x7ffaa4ca4708,0x7ffaa4ca47183⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:23⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:83⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:13⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:83⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:13⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:13⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:13⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:13⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,12305824977018057709,16557028500499211937,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5db9e08fe172a60c8a8248bed700ccb16
SHA145246103699e99ee549aba624b2815c8be517598
SHA256ab68b657f70bb236c7e334e5be4c50e78d671647fed92458cab9e5f788f8c6c8
SHA512de29a25b543625e3084eb9f97cbcefeb87f98025a9a921578a6fcb3cf928760bc19cfe28a2f0347e5727f226724e4e6a1f43420a0e84e6931cc74b6016c78632
-
Filesize
1KB
MD537760b784d4545168e4e96195c30ece3
SHA143b0ba1cc28f284ca5910560b5c395f6782c353d
SHA2561b5b859ae6bc0c5e78a62ba91446d2b83bf2a672ef6b3e63cb44457afda48b26
SHA512024cd1cc5354240a6bf7bada4a2d1e68776b778ee49000832863e238f9ad0dc8d9dcaa8a4246c8761ad340bbaa62f95ceb15fcd65dbdc45f3cd8e4f647dfe404
-
Filesize
5KB
MD582d6bcd6315f98c2b24bc27c0053cffa
SHA14c6a3d8f19c130bfb5a06ffd45fa38ddd0106870
SHA2563013b6e369492af91f9ea800dbd6b0e9ef2c00831569078a8ca4771c2ef4e079
SHA512b77e96ff9cc827912f8cce712ce8526c81cea45efb230f05ff00c4089b78e91e05f853aac3c7e117fac9561abab0fd4e6a34865dfc0a4881ec8305397c8ee9c0
-
Filesize
6KB
MD5f5f9b3c66f9256b1199ea602ad70da3d
SHA1ecd0db6ac972b3b96951c1cbd4b29beb9ad3b8bd
SHA256eb59d93f4987cc3f52730ea514b6e20026796ea4eafa5e8ee462856d86214733
SHA5123b4f943b1bbe6039f1cb0d948778e3f91205233671f7613a7689c654f00971a9af5552d13ad8d4a6dc3df3c3ec43d03bf3a991bd230dae3aeacf1b885d5dc359
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD588f1c119637c042206f9540183fd06a0
SHA1262480cc731b7c5df3db26a63bf46eb05c9ee1b3
SHA25663d091aa484f4c23a7f05e97fcd39bae7121a30e2904cb3aa1fa378e5bef6c57
SHA51284bd0aa52059d0c742316559a1d22aa4e0ab0b0354c85eaa2cfa0c10d59d9ebae832fb4c34768ee4a5a3d1510ed0358a5cf84a926659a7f2f154dd34dc9c841c