Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 22:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.es/url?q=query6fmm(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fxpkscvqdc3zjmqbevvbicimaburjqlbseg65q/bGFjZS5hcml6YWxhQGNlbnR1cmlhLmNvbS5hdQ==$?
Resource
win10v2004-20241007-en
General
-
Target
https://www.google.es/url?q=query6fmm(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fxpkscvqdc3zjmqbevvbicimaburjqlbseg65q/bGFjZS5hcml6YWxhQGNlbnR1cmlhLmNvbS5hdQ==$?
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4004 msedge.exe 4004 msedge.exe 3380 identity_helper.exe 3380 identity_helper.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 CredentialUIBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4876 4004 msedge.exe 84 PID 4004 wrote to memory of 4876 4004 msedge.exe 84 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4300 4004 msedge.exe 85 PID 4004 wrote to memory of 4940 4004 msedge.exe 86 PID 4004 wrote to memory of 4940 4004 msedge.exe 86 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87 PID 4004 wrote to memory of 2512 4004 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.google.es/url?q=query6fmm(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fxpkscvqdc3zjmqbevvbicimaburjqlbseg65q/bGFjZS5hcml6YWxhQGNlbnR1cmlhLmNvbS5hdQ==$?1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefb2f46f8,0x7ffefb2f4708,0x7ffefb2f47182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9104801542617132451,1001443277366737054,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6136
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainer -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
19KB
MD5d5b89ceec2b024c565802c0e51607044
SHA174696825d59f384d3d874638537bb4920fdb60cb
SHA25605dc99c6e0751d3a98e970f628c8426a967cf068a4bd681bdbaf6f627d54c7e2
SHA512bb683a290b2f506a413baadca020a9716299221746b3e6a0d4c9f4ba481b3605f2911c1011f60f0d38d155f8086c3af51f21d8c0164eccb911b4531983c544e7
-
Filesize
119KB
MD5fdd60f2d9c8f190e67c886de43721856
SHA1d685fdef20a2f4882464b4c26cf78f59442edc21
SHA2567cd3c084ee3fb16c7ecdb65815cff6cc84708d736792972aa2440d0965591791
SHA51260db574e7d80687e421c85affeac36dead5e30f97c05e8ca2cb73c22395be19e6e7218f0b80a14dd09093fa12a7a5bac9c249af1e6de7cf92474ea747972bf5d
-
Filesize
113KB
MD581ed9234f840b919ad3b285b13e66dd7
SHA13fd15d6552a9c856ce4174a7d1e767e5f708f497
SHA256f1acd1fec4a960b8fc11cadadb5af5bdc9150a3f904e37803c504a401216465b
SHA5129f51e18aebb21e214fd69c03cef4bb0b854d76579b139c316f7fee0eaf6af57c6d512b2610dbd2f7a60e1cd446248dc725884fca682bcd22014a0d58eba13141
-
Filesize
120B
MD5aef7b12eb57544f3241bb606505eb040
SHA17e74c86579bd769a07ad0796e3db7e704f7af4e4
SHA2568f39749f0184a1702ad43c7783425efb38712316f66e50f5f8734c60ddd2317e
SHA51296e4daf9e7f5b5290b025ef1aae92d4392d0d9c7a6b93c7bf83b957b72737cfc03691dde2a055337c23a9fb1f1748b9a421e1e802f4f4963fae58993e7198969
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD53f4bc2f096c95748b0983933ca5ad25d
SHA143fdab4363540533c753b6c45d6b4602fa120e44
SHA2560323765f9215fa7717e497728ceffa6973c67fa7d89ef71406c901c917c4128b
SHA51209773c3e87419f14c553cd7e302e4484f5dda33eb8f55bb2a06c78886c7de1b154ac081de363e07fb580c9a152cef65e91684d9a9aa3cff3dc674738ba9f02f1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5ad9f6a0eb4201697a6c76059eaa16aeb
SHA165dad5b3deeae850abfa7abe910d3f937b56f9aa
SHA25686d62b803be232415801b3672e80370b8ed205aa55fbaea70a35da9d8eec716c
SHA512a7679e689077d4d5e71a4b1dda6544aa9525972f558d6ae3f50745192ebdfe1609d464849225e63fc98df60575338c4f37b0db7315e668f4d9f2ffeb4233dce3
-
Filesize
1KB
MD5db68b0b2941ba1002f39713bf6fcf226
SHA1d6ac782d4127cbf826015640455b5535a5284af4
SHA2562757ecaf8c2de8db42f8598770aa909e4e968385c1f5c8e73d8696ceafd67c5a
SHA512624b7bce089a0e8f3c3b5bdd0995b61d20c818344cc8389a1143b5da1a6120902f122d4ef921cc9eb9052349968ce5f630bdc13bf3584c179e1278e24847a5d9
-
Filesize
1KB
MD5dcf4638d2b8247a71dc7ded33960f13f
SHA11fcb0292c4a63b863b03c13623080d4160c21a2c
SHA25651ab8e6ed18a1f3ac80be38f17af1e1fc4801ae4dd72f8487dadea42d2a854d6
SHA512de75935e18f106b19110130b95ca6120b28cd2b4877d1bd1a28f12e4ae9dd4ac74482364403cb6a80ac05a912b3677e8ff4804228d269c5b92886d13031377e3
-
Filesize
7KB
MD5097b6eb4755f962e055cf79f3d7a1244
SHA17ab2385511382a43abfba9a7de25e405505c66b2
SHA256be7b8c8c5b69a64cf1c0b6ef2484e919ba6abd6d940467b6b1fa7cdbcceac038
SHA512b3400402aef2c04c482747bb1d2b58078c6e282e60a23ef3924d81781183ba512addba118774e1424530f5789927a73ddacbe525835ef8f24ce69ab9c0d8a196
-
Filesize
6KB
MD597bedc61ef2a84914032a72582e33256
SHA18d206c36045d5eb81d330dfa8cb00804d2fbcd01
SHA2566b0c558529a16e8b26381bb5b63a7f8388b9b3f3d0fd3a09c2f483947a9450e7
SHA512fc1eaea29a374e3c23fa2c5105bdd9f1e492873542da9d3e7cf79d969fb5fbfe9970cd2ee54858aecaa0835dbcdfb0c847f95f09f41caca354482fd80164e097
-
Filesize
7KB
MD5f47bae84bc11618dab626d409cb967d6
SHA12f04e1157c70d568759176d4f4aadfe7b355fcc1
SHA25654fe2a38726310b1f7598faacdaa6338201cde6530964117d30129f6846c8719
SHA512e97197735be48d0a5959ba1a5222bb2f5d46479f24d2d1009c67ae0a308de01fffd6ab9c47a60a5fe0810046525a68a6b58a803b067999e033cd5532fcf33bcf
-
Filesize
5KB
MD5ea989b6cef6ad81e5ed7d7387ac0e73c
SHA1453a2f7bc044dbc3c632badeb69e4b7e9c41bc97
SHA25614bed5f0d24fcaf6145de26dc7937117cc42249be187203a1d63e618bd2cd7b9
SHA512b8a8d201434920cfdffd3a030f70ac6bfa242592e399f3f9ce0e98660a755dd25e036ca81cee9f66d589e355c293d00edd359df8e0cf74f3cd86e9ffb61b19fe
-
Filesize
202B
MD5f9328fafa04f1f40b32dcbe84d1094c1
SHA1d738d786711da762f2385c8106f2ac8ab9fa9240
SHA25621fad1c963306ae46dfa2d771255634f8d1aa87af5b122f96976fa46dd504e5a
SHA5123a5e8cecf022ed36c3c58cc3dc1ae949b050275017ef838a885a9317195f16e6f52223823aaa0203b17a27e65fcd029480b15365dd48f7c8ffee140ca6ebdf60
-
Filesize
202B
MD5722b6c066c3954bc661957a6cf3f32d9
SHA1189a70ba6386c5d8ffff35f91351e718fa5734ef
SHA2564b91826b1abc69602b2f02443261b639bd8de7ed9e8165f6408f65383415d463
SHA5128de1f1efeacca42cdd123b880efb5b275edd03acbb9ae442d2c26c752667e89c30ccf082cc60e95a83aa55acce8cc80e8876b77851e023b8944804c1a4d9ba9e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5b3eff5d89da0963e0d775526b722028a
SHA1b6592a30569bf017520c6596765010c7018e5747
SHA25695585dfffbce416b9a0011fa1b8e30c4cf9f326467410a39d41663a610ba9532
SHA51228414143bd146be85865c1f6edb534f7d1e4dcde552a961d54f5710347a20497f107ab54ffd7b915113fc5cd8afaaecd1854a34bfe85cc10eddfc422d317ae87