Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
360s -
max time network
389s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 03:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa2t6bTJiT2VoRFhmZzVnVkZ0czZEa1lfUGFyZ3xBQ3Jtc0tta3g4QXhjdTZhNVQ4VXRNNHIwbXlPMElmX1VmMWNOUEJuMHVaMzhERHBOM012QlJ1eVRiUXg3a3Y4cmt3dmh6MVdYQzRBOGl1T3hSUlpfVzBIMThzV2phQUdta1BMQzdUV2ZfY1NWaDhSTktVM1hPZw&q=https%3A%2F%2Flootdest.org%2Fs%3F57667117&v=2azXh0ilP_A
Resource
win10v2004-20240802-en
General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa2t6bTJiT2VoRFhmZzVnVkZ0czZEa1lfUGFyZ3xBQ3Jtc0tta3g4QXhjdTZhNVQ4VXRNNHIwbXlPMElmX1VmMWNOUEJuMHVaMzhERHBOM012QlJ1eVRiUXg3a3Y4cmt3dmh6MVdYQzRBOGl1T3hSUlpfVzBIMThzV2phQUdta1BMQzdUV2ZfY1NWaDhSTktVM1hPZw&q=https%3A%2F%2Flootdest.org%2Fs%3F57667117&v=2azXh0ilP_A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{8B0A18F5-2CC7-4B72-B841-AA0F71FEAFF4} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 2900 msedge.exe 2900 msedge.exe 1712 identity_helper.exe 1712 identity_helper.exe 4088 msedge.exe 4088 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3444 2900 msedge.exe 83 PID 2900 wrote to memory of 3444 2900 msedge.exe 83 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 2200 2900 msedge.exe 84 PID 2900 wrote to memory of 5008 2900 msedge.exe 85 PID 2900 wrote to memory of 5008 2900 msedge.exe 85 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86 PID 2900 wrote to memory of 2652 2900 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa2t6bTJiT2VoRFhmZzVnVkZ0czZEa1lfUGFyZ3xBQ3Jtc0tta3g4QXhjdTZhNVQ4VXRNNHIwbXlPMElmX1VmMWNOUEJuMHVaMzhERHBOM012QlJ1eVRiUXg3a3Y4cmt3dmh6MVdYQzRBOGl1T3hSUlpfVzBIMThzV2phQUdta1BMQzdUV2ZfY1NWaDhSTktVM1hPZw&q=https%3A%2F%2Flootdest.org%2Fs%3F57667117&v=2azXh0ilP_A1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb61a646f8,0x7ffb61a64708,0x7ffb61a647182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1992 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6536 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6380 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6548 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15943341577959500637,4641882532418128284,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\15642701-a795-4a5a-8ca5-f0ed7cf2e9e3.tmp
Filesize3KB
MD5365ff42022853f8d866a4d097a4ddcff
SHA1566904c9babb02bc26732eb2ba8df0e1db756dde
SHA2566cac1b469e4b1fc90d4ad7a5d2502f1ef0b93bd102794faf14de2ab27ec17e4e
SHA512b8bd4f731cf1a7c01e2148b1c7fb4ae45d70bb3e0d0fe88c252313c2b05c6447b201cc3863c61d814716fc94bf1d187a3f77bd32f59e16133b4ec702df5eb166
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\22b8b32f-307d-45c2-b4c2-e99f1995c9d5.tmp
Filesize8KB
MD56746e0cc7af020f5453ce459e806747f
SHA16931d4edaa5c44bd1f9145e540a1138990311cd1
SHA256fe2d69c4d837a198a269e74bcf6714a91b8a4426446cbfdaa9de156254de1d1b
SHA51298d9a949881c286447832c939d62c5e8696ea8e80ea772d22018070759cb7b81103b52195575e07405f837de195f733a9d9d6b9b1fb83db09bd5cf9c4b250335
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD59ebcb05b263cf68642cb79a3c9be00b2
SHA15216e194e2351def1c79b08764a525611cc61bd7
SHA256fd7427caf9b617f9c5404d03d9eb2a39f6b35fd5e2a0e2fe37f91f33a8375734
SHA51276af55499caa28a3642bd60b947db6d16631ab762c4724e6bc24efc347120519f08b814ed1dd029b1555cee7533d6e6f38064f93c6b4b67d16b7873edcf0f7c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD55d71e26f5213f88c3637faf973f81214
SHA1b5aa36eae163564a3e7b3c7d3ee8dd613718da93
SHA256c26cf9ff366695800790601dc34eab4f1518545e0e353aa88ff2d29ef2a705b4
SHA512af3edb806b053f5e528be968eb9903aea4f3d3aad340611690a43db559e12fe967ec937f65634958b7b13973d12f298e071e2a8b0f6895fa533e7737765ba9ea
-
Filesize
3KB
MD52a6e391b8daf265747a5ef60bf6120d4
SHA1f8272d8e457947e743b7d90623424ba5bad8b4e2
SHA256d5a4832ab7b984c08c49e53160ccd14d9ece8b0a61ea3d4f0439156876a2efe8
SHA512d6d8a4f3dc7c90ff3b61f2eda8204f359cad67d1da2b0d8156a01ee58eeb785734112500cb5efd5ae9da0e23f3f331fbec9df89737045b44e74dc28e24a60079
-
Filesize
8KB
MD5229b8890c8e250c706ecd2d1e8636327
SHA1f3358900925d7b4256942b5e09e1de0606824e88
SHA25603425732875de812c73cadfc068070d3142ec50facacab79df90230f70328474
SHA512ea8c9c44f5114df4f2327bc868ebcbb77e32ce102170f9845e0c8034ef77d07a77887869ca8d16542843703ce15080bc2ae168b99730cb9f6668698f4f752ffe
-
Filesize
5KB
MD5294fba2e9547936517281a8302c8ab31
SHA10657e5269ba48c61ab862406b4ee6dc2a1f482c6
SHA256b9772505f3f6f6076c1e1592cbae33184bf393a54551e04356dcba8e18635097
SHA5125c8ecd5b762bedeeb7ef2cabd8cb36dc2206638ef878227e256dd367317ce6e5419ad17535477f67502014d97c2f1770f56d8d3c957fe4efcee663210c867360
-
Filesize
13KB
MD56e638171ab904124354a8bb809cc55a7
SHA12a6eb4fec9d3471c50c4eecfd2d2a07214b8fea2
SHA2564b9d4df726030e61e13765e8a38d58f193f53140555100735cd7396ee7d7a428
SHA51232875cb4df626a0eb840b8212ed49942d449cb3d377153e02f1e7c46eafb76e99c912e371870b2a0447ef462ab5a43bbc1802e306d022d2db1ae852751ace93d
-
Filesize
14KB
MD5efd24a270d645c26eab09ff2dc0e2c2a
SHA120b3c4e30e8b2ffb9e5d31fab3c8324aa3eb8322
SHA256be1d714fcd43befc6329124ad6942882b6e06a992e87612d48bfe5638a529ef6
SHA512f0557c9625876ee76deb060a3321a941d5c3a878dc674d7e5cd61323fbc64991ed05bdb88968cc0a3cd66b41824e4eaf8e3f2650b5368da1123edaed67043773
-
Filesize
7KB
MD54e36ba7eb20c067044fcffc589120367
SHA1d6e40529985a559bcb1eac01ce944efa16dab7fd
SHA256f2af76ae63545dce69bb13367e92dc179e350b73a3250a82f8973cd7bfd41a99
SHA512f1954368fc64482494705723d5bc8a750d5d2d70644c1bcd82b13676f907a9d6e95ffa83d1fd16dbae87bc83122bf05151ba133583319297c3fb729f9f6d406b
-
Filesize
3KB
MD5235e23b4f765904c8e81419b2b1953a3
SHA1937840c227fa0d2c26045725849d277fdfd535d1
SHA256b116273b9bd08a577b846e21ba7039f3622c3da1482ddc4a73df72a3d0009d48
SHA5128e7c64a78cebec7053bebc0d9c6ad5f5a32c6ad188a7beec0119891caab2993f33e67a00a6392075f84e0bf4fb55ec3505b8ad30d9e6dcde098e62acb466911e
-
Filesize
706B
MD540617d61b2501285396401ca16ec66e3
SHA1f6407eb303f366d239bca47392e0c549482d196e
SHA25625b90ba2a8e866bdaaf1b4a66fdec6fc7a3baf34d2808d519fc8c9364f8023ad
SHA512a072c919888a8800a57a57186cd8f3bd2ab57c3f853bce9a667a594c17b59d173cb3808cf64225d602560996f4aededcb2667ace6f660dfb8f19ddfd167b9839
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cd3281607f36315cdc5a434b7fbd5268
SHA118ee7afb086d2b6778476340144e128c2e8e7190
SHA256622fa5255d7c09737fa5927e7b76aa8edfd9b23d03a0d43d75200e8bddb6db20
SHA5124d8c130101eebdd689b12804608af794de201577585cdcd681eb0e58a57746dc4e643e9ee8c664cdd8bb1bd05ae2ed4e38df690c4a0de3c940f73eb7f2f5c474