Overview
overview
8Static
static
3JJSploit_8...up.exe
windows7-x64
8JJSploit_8...up.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3JJSploit.dll
windows7-x64
1JJSploit.dll
windows10-2004-x64
1JJSploit.exe
windows7-x64
1JJSploit.exe
windows10-2004-x64
3libcrypto-3-x64.dll
windows7-x64
1libcrypto-3-x64.dll
windows10-2004-x64
1libssl-3-x64.dll
windows7-x64
1libssl-3-x64.dll
windows10-2004-x64
1resources/...bot.js
windows7-x64
3resources/...bot.js
windows10-2004-x64
3resources/...lip.js
windows7-x64
3resources/...lip.js
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit_8.6.0_x64-setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JJSploit_8.6.0_x64-setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
JJSploit.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
JJSploit.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
JJSploit.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
JJSploit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
libcrypto-3-x64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
libssl-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
libssl-3-x64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
resources/luascripts/general/aimbot.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
resources/luascripts/general/aimbot.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
resources/luascripts/general/noclip.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
resources/luascripts/general/noclip.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20240802-en
General
-
Target
JJSploit.exe
-
Size
10.5MB
-
MD5
7b4a51d94f2d3c22a523b251692795d7
-
SHA1
471e6ef7fa91437bd77fbfc4fbce5bb09b5db55d
-
SHA256
d3f39b70276fdc06a4e355218f3cf9239fdcea1c6881bc045812306982218c8a
-
SHA512
29ed0f0d3860eec3798cb7b9799651d1991c4f29e220f654032a8f0f2e5c98349c3982d78545f7675724f735ada3c78efa2336dce72cc456bbe9e34135eea8c6
-
SSDEEP
98304:UjBtBqSt4iQx6mxy8PscJCo5m+mGs0ITIECQa99bUHpV3iYgf79N:SDsSt4iQx62Pc+Gw9bUCYQP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 1152 msedge.exe 1152 msedge.exe 2892 msedge.exe 2892 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 532 JJSploit.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 3788 532 JJSploit.exe 84 PID 532 wrote to memory of 3788 532 JJSploit.exe 84 PID 532 wrote to memory of 2752 532 JJSploit.exe 85 PID 532 wrote to memory of 2752 532 JJSploit.exe 85 PID 3788 wrote to memory of 2892 3788 cmd.exe 86 PID 3788 wrote to memory of 2892 3788 cmd.exe 86 PID 2752 wrote to memory of 640 2752 cmd.exe 87 PID 2752 wrote to memory of 640 2752 cmd.exe 87 PID 640 wrote to memory of 2028 640 msedge.exe 89 PID 640 wrote to memory of 2028 640 msedge.exe 89 PID 2892 wrote to memory of 4672 2892 msedge.exe 90 PID 2892 wrote to memory of 4672 2892 msedge.exe 90 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 652 2892 msedge.exe 91 PID 2892 wrote to memory of 3084 2892 msedge.exe 92 PID 2892 wrote to memory of 3084 2892 msedge.exe 92 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93 PID 640 wrote to memory of 4548 640 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JJSploit.exe"C:\Users\Admin\AppData\Local\Temp\JJSploit.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\cmd.exe"cmd" /C start https://www.youtube.com/@Omnidev_2⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@Omnidev_3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0x100,0x12c,0x7fff3dc946f8,0x7fff3dc94708,0x7fff3dc947184⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:24⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:84⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:14⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:14⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:14⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:14⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:14⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:84⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:14⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:14⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:14⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,7757351737781767016,8496909284380263967,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:14⤵PID:1920
-
-
-
-
C:\Windows\system32\cmd.exe"cmd" /C start https://www.youtube.com/@WeAreDevsExploits2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@WeAreDevsExploits3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff3dc946f8,0x7fff3dc94708,0x7fff3dc947184⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6091160369461497494,4031070384368652919,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:24⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6091160369461497494,4031070384368652919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5bc9a9d9b452ba65953b58b1e9be115b6
SHA162cbc0c04ba9abea01b70a77867d238b4ccf9bc1
SHA25618f73e6e8775c3cbd27eb68042e9049271a27842011adcc0f070f6f6ec09bc7f
SHA51221d645890c0018568b9b1879b018884a1b4dcb7c8b1c40e05229ce976083e7d035275082c9580da203bbf485802373e4450373e581092399bb92a6ca1b02da70
-
Filesize
6KB
MD5e9e1d6817eca174c83bcb6ab51d58045
SHA15852ec3a017901fed1a0f8cc253be4a5c732983a
SHA25603af3606b6aea74e3097626dc95ca1ff592cbdfeb8899fe3ceacef5a370d7fd8
SHA5127ccec84830cd334ba7c544d9bdca8a5d4143b73d84f93930521b3ef59dc809a4b5ff9d659551811bf420ed1f779d88d5dcfd5039453cbe562e0265b76d973e82
-
Filesize
6KB
MD52df63109b3bfc76c557bb130aef6bc90
SHA1ba24138bad0d40f6f13c9f6565b3476091e3132f
SHA25697f4174ef4cab5805c559b90654b93e6c1715bc3e96cc6b1ef20a665a230355e
SHA512cf4e62c8a1cb829b7a2adee20cf494ae6692d23b294443e39c9da598bfcadbbb5d1944b02a7e11a51b12512eb4076e593651e7bc208d907f4ddb16d5c24a05c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55fa94d0e31993b0d881c255a8085412c
SHA1715df55311b6842b9e8f9f5031365c086d618383
SHA256f1af0039a683c8dfca72df03eb5cd660319546758d941833dc40df8ff4efc217
SHA512a59f4dfce8fe0ae4da40ebad1af72bce9fe492b5075d30bd5853a107227746bb5f7fe843729ca4b14d776fcb208ad348e5c49d55415067bf0b463f1627efd0b9
-
Filesize
8KB
MD5247d93fe54030961f106a88a8d2148b2
SHA165d16c3a5a5560d8cf52ccfad1a37386a7a00a1e
SHA256065185b1042575f363235f59c241d7e53c18f1fcd39a772a68b0d46f3bbac3ee
SHA5129d1422de509a996451973376e208d1f5cfec8b95229718b98f3a5e9725f2c116aac41c6abe53a5a38fa7c46d1ff2db247daacdfc24055a90e97c9390716b296e