Overview
overview
8Static
static
3Nitro Gene...FE.dll
windows10-2004-x64
1Nitro Gene...en.exe
windows7-x64
8Nitro Gene...en.exe
windows10-2004-x64
8Nitro Gene...FE.dll
windows10-2004-x64
1Nitro Gene...ip.dll
windows7-x64
1Nitro Gene...ip.dll
windows10-2004-x64
1Nitro Gene...nt.exe
windows7-x64
7Nitro Gene...nt.exe
windows10-2004-x64
7Nitro Gene...er.exe
windows7-x64
8Nitro Gene...er.exe
windows10-2004-x64
8Nitro Gene...ll.dll
windows10-2004-x64
1Nitro Gene...ll.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 12:37
Behavioral task
behavioral1
Sample
Nitro Generator with Checker/BFE.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Nitro Generator with Checker/NitroGen.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Nitro Generator with Checker/NitroGen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Nitro Generator with Checker/WebDriver/BFE.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nitro Generator with Checker/WebDriver/Ionic.Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Nitro Generator with Checker/WebDriver/Ionic.Zip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Nitro Generator with Checker/WebDriver/Jint.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Nitro Generator with Checker/WebDriver/Jint.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Nitro Generator with Checker/WebDriver/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Nitro Generator with Checker/WebDriver/Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Nitro Generator with Checker/WebDriver/vertdll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Nitro Generator with Checker/vertdll.dll
Resource
win10v2004-20240802-en
General
-
Target
Nitro Generator with Checker/WebDriver/Jint.exe
-
Size
7.2MB
-
MD5
3835d3e8ee4feec6e173b292fdf2ff83
-
SHA1
0fba846445f7d59d33361827d0fa6fb47c332015
-
SHA256
d5928829da606afde1d43835e31ca1367f7105b5e28bba01be7a82775d3a735a
-
SHA512
99de33b7323cf392bcad275760154c542e8450968e50caecc9c7c7f5d30dbbd74de8965f6300e79c4b7ddef5052120f55a649487afef7903506c971e0c9d7573
-
SSDEEP
196608:t6PmCsXDjDyf6L2WliXYrHW1L0XFowUHWZrQ:QPmCEDVL2ciIrHWRCowU2
Malware Config
Signatures
-
Loads dropped DLL 15 IoCs
pid Process 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe 1720 Jint.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133712230728375682" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3444 msedge.exe 3444 msedge.exe 1856 msedge.exe 1856 msedge.exe 3540 identity_helper.exe 3540 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1720 4840 Jint.exe 85 PID 4840 wrote to memory of 1720 4840 Jint.exe 85 PID 1720 wrote to memory of 2100 1720 Jint.exe 86 PID 1720 wrote to memory of 2100 1720 Jint.exe 86 PID 3312 wrote to memory of 4984 3312 chrome.exe 98 PID 3312 wrote to memory of 4984 3312 chrome.exe 98 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 556 3312 chrome.exe 99 PID 3312 wrote to memory of 1632 3312 chrome.exe 100 PID 3312 wrote to memory of 1632 3312 chrome.exe 100 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101 PID 3312 wrote to memory of 4664 3312 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nitro Generator with Checker\WebDriver\Jint.exe"C:\Users\Admin\AppData\Local\Temp\Nitro Generator with Checker\WebDriver\Jint.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Nitro Generator with Checker\WebDriver\Jint.exe"C:\Users\Admin\AppData\Local\Temp\Nitro Generator with Checker\WebDriver\Jint.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2100
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffba930cc40,0x7ffba930cc4c,0x7ffba930cc582⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1860 /prefetch:22⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1996 /prefetch:32⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2404 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3744,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,729764489991135187,56966326485514806,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbb90546f8,0x7ffbb9054708,0x7ffbb90547182⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13646239853597982153,8607138569748392079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1832 /prefetch:12⤵PID:5028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD566a9c91072f5e1e19347ea4c27d0abf1
SHA13b24d245a83a459f003ef48bd79be0e04f85904a
SHA2565fc609173c4609848c6b9922860fe9d091e4b7ebd820928ffd3c6766ff8d0ec0
SHA5124e064ff091a954d7222bf724800cedb5151cf4b6f82a27e5b742b7dad84dbe3adac77d115c2e3962639cfd15e2bc5c267c71b7f2fe6ebbbb44963ac167bafe67
-
Filesize
1KB
MD5acd1f26dc1be11d489ea78ddce39ea4e
SHA14cc2466c0caa79decdf82bd42b506cfa629bd96d
SHA2568062fa0a9601f32100d010cb30feeb5072082b0c7b953fffae34003240c7664f
SHA5126f3cdc5ea2f531814b8dc9d64e854110b3d0239edba9bef0eea8cb35d0634b8e1dd9528526d4f8d8ba3c1438b37aa33dced9e98564b5d3fb7b2811fda39d516d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5dc6a83edaa72d9bd4bd2823d1802597a
SHA1976bb8a1665f68d6b53e945e4389dc152fb3e54a
SHA256c9d6334121f335873da6329dd70788fa74bfebd50e7139ad2a0990dfba5feaf0
SHA512dff2693fd20270912abc437fd9084b229b2c3f749e2364c4e045910322feaaaad01c230b4c9033d4fc44e7cb77fb5ab7fccc43550277bdb58d4a3bc6ed34314a
-
Filesize
9KB
MD540d6c4825657194d9be2daa8286e18cb
SHA19d80f48d0078735126aece865c834396ddabca2d
SHA256773f9f5395854701fe80dda6b26956b9744fc6443bf683d3962b4b1cf9d164a5
SHA512fa52567b64bdf189a22a1fe61bc6a6e56f640ce294d98ee2231281451eff142481d5aee5edd1745be5bfbf4b942e5cb036085f7c6efe838fd144f9e3c3ba57ac
-
Filesize
15KB
MD5653c7537a3f80029888a306797e19364
SHA1130fe71a483ba88894160396e76e0479d03e25a0
SHA2569ea2e87b55c5e40a6a4fc1eb1aed87385bb0bdf8a135302e8bcd7fd4056a0d38
SHA51278f801ae0eb71f9fe6a30cc5ff61d688034f878f6a5513b9e98c9e1de7c46ab2ba3eca81d8c59d60bd6b327d76da4b9282d49937cab9c06f0eba1560f9213a59
-
Filesize
208KB
MD58a28eee580e91d0d4b685f29cdbed806
SHA1343b739bdc0386e394951faf889559fcc82fcea2
SHA256bd62c0567a011ac95121dcf1dc4d678a74808ae8829db999242ebf7fcdf832db
SHA5124799c2074b4e10ad11a0cca3c87445c62292d1d385b15285bb6a9241ad617f490a8f374553468b1a1a9d3c8dca09f3c71c85d558f80896bf566aa2c00042b639
-
Filesize
208KB
MD580f03aec1cc823770e7a9a5801b0b8f5
SHA1d22749c5dbb0bdb1339aba3f450bba839228c2ed
SHA2565e9adc85bad021ab6bc78fde96341e7a45f253e4aaafdab8e860a43ffb14782e
SHA51224231da3a5e282a93e0008097fdb158bd4cd93ac5fea0ab1cfacc03635f6e1c665893db4a5d98cb88dfa29ad55655180b0d9d2810a74ae248811319002f1f693
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD5898c952745092a1ab12c49fdc9dc3dbc
SHA1a4e123f626b7bbca4b022821ce3c5bbe92f7c2c7
SHA2560580939f6949262cae9700943ce16f5a77b7b5d9afbb44d12d825d4bf35cf1d0
SHA512c2746c3be1ebb4e74d3f6ab2ad0282d28920412cfb63764d4538497fb1e90649644fa5211862cb76f217fdc3305801facb6dfa48c7cdc9951a52bbdcc846bedf
-
Filesize
6KB
MD5a775572cbaff42f298a829de7e5d7a17
SHA19630caf55270bed4eb21e95fbe4056e262a90a91
SHA256ccfcc83b9edb1c586a159bce75ffee3d64fd44562c3391051e8750db9e655b90
SHA512619fce06f09477b8381811db8081b24944b991acc961a513279510e02616d5c40e96e5047d5fd4cdb34c3581cb982f80d4f6e6dc6d2847c539d1138251e54927
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54ab922dab25dbf1d8b463a2e4eae0cc0
SHA158c0b33c3f3a24610e678c94165568545df308db
SHA2566714ece6095cacfeb6e8086fc69d74be02e26089083529eb40ab689213479e1e
SHA5128a4d754a384c3d622ec1caa1df4082d6975310f10901a7018286708efc5acfa3eb8dc48b3fc6494c7acb1fb3e3e420b39cd74d643073c06f40bf66020d45a07c
-
Filesize
10KB
MD53fd9e52d3e6aac8552669d29d70dc5b3
SHA1d07926a47d53c689e91630f7eaf6aacb4d6120c6
SHA25632e3ff23331d63160a4923051041a9a25d7d86a04461592ca3f66986e4e959a4
SHA512ed9ca9edaa21e661252fc458662981e4e50287f52a071c7af5ce496677909c4dc5aa413cce35419d7c3d701c5b2d9c46ea5f2581f865d48404876db38acdb96d
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
84KB
MD5a991152fd5b8f2a0eb6c34582adf7111
SHA13589342abea22438e28aa0a0a86e2e96e08421a1
SHA2567301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef
SHA512f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
64KB
MD588e2bf0a590791891fb5125ffcf5a318
SHA139f96abbabf3fdd46844ba5190d2043fb8388696
SHA256e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6
SHA5127d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf
-
Filesize
159KB
MD5cdd13b537dad6a910cb9cbb932770dc9
SHA1b37706590d5b6f18c042119d616df6ff8ce3ad46
SHA256638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e
SHA512c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199
-
Filesize
28KB
MD5f19d9a56df14aea465e7ead84751ea5f
SHA1f170ccbeb8fb4a1e0fe56f9a7c20ae4c1a48e4a9
SHA25617ccd37dfba38bba706189d12ed28ca32c7330cc60db7bf203bf7198287073e4
SHA5122b69a11026bf4fe3792082d57eaf3b24713e7bd44dfd61ccaa6e5adb6771e49b6c81c1b542fbb159c9055db9739b9c4473a856914c72683a2a4cf658d6d7a469
-
Filesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
Filesize
151KB
MD5cf7886b3ac590d2ea1a6efe4ee47dc20
SHA18157a0c614360162588f698a2b0a4efe321ea427
SHA2563d183c1b3a24d634387cce3835f58b8e1322bf96ab03f9fe9f02658fb17d1f8c
SHA512b171f7d683621fdab5989bfed20c3f6479037035f334ea9a19feb1184f46976095a7666170a06f1258c6ddf2c1f8bdb4e31cbfd33d3b8fa4b330f097d1c09d81
-
Filesize
763KB
MD5abbe5270af3906f418a479c104a04a5a
SHA1520c6184459e9b526ffaefb985a1446d3511c028
SHA2564d9abd9354a1a7554109a4a01f23d0b18e34b8fd1e953a2ede4cbca7952e695e
SHA512a0c790f99fe4e7a02ab5107bcfa025e30ccb468b7b8f4f528fc34d6ad670087a5ff95ad38568b8ff0ec254a9fcad7fde743a1b98720277604720454bdb48ae55
-
Filesize
253KB
MD53dcd08b803fbb28231e18b5d1eef4258
SHA1b81ea40b943cd8a0c341f3a13e5bc05090b5a72a
SHA256de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e
SHA5129cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
Filesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
Filesize
1.1MB
MD5cd12c15c6eef60d9ea058cd4092e5d1b
SHA157a7c0b0468f0be8e824561b45f86e0aa0db28dd
SHA256e3ab6e5749a64e04ee8547f71748303ba159dd68dfc402cb69356f35e645badd
SHA512514e76174f977cc73300bc40ff170007a444e743a39947d5e2f76e60b2a149c16d57b42b6a82a7fea8dd4e9addb3e876d8ab50ea1898ee896c1907667277cf00