Overview
overview
10Static
static
10R.E.P.O.v0...ME.rar
windows7-x64
1R.E.P.O.v0...ME.rar
windows10-2004-x64
1R.E.P.O/Mo...tor.js
windows7-x64
3R.E.P.O/Mo...tor.js
windows10-2004-x64
3R.E.P.O/OnlineFix.url
windows7-x64
6R.E.P.O/OnlineFix.url
windows10-2004-x64
6R.E.P.O/On...64.dll
windows7-x64
1R.E.P.O/On...64.dll
windows10-2004-x64
1R.E.P.O/REPO.exe
windows7-x64
1R.E.P.O/REPO.exe
windows10-2004-x64
3R.E.P.O/RE...ss.dll
windows7-x64
1R.E.P.O/RE...ss.dll
windows10-2004-x64
1R.E.P.O/RE...rp.dll
windows7-x64
1R.E.P.O/RE...rp.dll
windows10-2004-x64
1R.E.P.O/RE...bx.dll
windows7-x64
1R.E.P.O/RE...bx.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...ts.dll
windows7-x64
1R.E.P.O/RE...ts.dll
windows10-2004-x64
1R.E.P.O/RE...th.dll
windows7-x64
1R.E.P.O/RE...th.dll
windows10-2004-x64
1R.E.P.O/RE...ty.dll
windows7-x64
1R.E.P.O/RE...ty.dll
windows10-2004-x64
1R.E.P.O/RE...on.dll
windows7-x64
1R.E.P.O/RE...on.dll
windows10-2004-x64
1R.E.P.O/RE...3D.dll
windows7-x64
1R.E.P.O/RE...3D.dll
windows10-2004-x64
1R.E.P.O/RE...at.dll
windows7-x64
1R.E.P.O/RE...at.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 20:37
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2-OFME.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
R.E.P.O.v0.1.2-OFME.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
R.E.P.O/OnlineFix.url
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
R.E.P.O/OnlineFix.url
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
R.E.P.O/OnlineFix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
R.E.P.O/OnlineFix64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250217-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 48 discord.com 49 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1400 msedge.exe 1400 msedge.exe 2812 identity_helper.exe 2812 identity_helper.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 1400 4920 rundll32.exe 88 PID 4920 wrote to memory of 1400 4920 rundll32.exe 88 PID 1400 wrote to memory of 5076 1400 msedge.exe 90 PID 1400 wrote to memory of 5076 1400 msedge.exe 90 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 4932 1400 msedge.exe 91 PID 1400 wrote to memory of 1676 1400 msedge.exe 92 PID 1400 wrote to memory of 1676 1400 msedge.exe 92 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93 PID 1400 wrote to memory of 1908 1400 msedge.exe 93
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://online-fix.me/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe327146f8,0x7ffe32714708,0x7ffe327147183⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:23⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:83⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:13⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5196 /prefetch:83⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:13⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5616 /prefetch:83⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6592 /prefetch:83⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6592 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:13⤵PID:328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:13⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:13⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:13⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,6812582911426367200,5386201222481821196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x344 0x2441⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56738f4e2490ee5070d850bf03bf3efa5
SHA1fbc49d2dd145369e8861532e6ebf0bd56a0fe67c
SHA256ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab
SHA5122939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b
-
Filesize
152B
MD593be3a1bf9c257eaf83babf49b0b5e01
SHA1d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a
SHA2568786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348
SHA512885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize912B
MD51792d0037d01cafa6a89a8f61c998854
SHA15a969be9157748612fdfd42b552b3e79927214dd
SHA2565f7fe5a1224d1f6de7e95c866342d09d923efed9dca2862bf6058dac48f69645
SHA51257ba4d98bf958ca9b85ce4a1daa80a84dc5c0e3c87a778f256f5aef8ced5d3cfc24601fdf47e4502da121ee9ff27497412a1a325973fd4bbd339e717e1c73395
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD52b6262317e4bb43ceb269ee8bd5c5c53
SHA1198898f03267e8136dad89bdbb10658ba6b2b8ab
SHA2567b353e723142cd2c714bfed618a3a091ce02f0fa97f5b9411540addc79c85cb9
SHA51264f76a2f4e59a48e58b6aee6da805736c784c1232882267f023c16a4c962e7feebb8e8b8d043d1941803cd0183ffa88e5cef4373335f7f3c51b600c166859875
-
Filesize
5KB
MD5ebfcd818a3cf06400480b6716570c594
SHA142e1ca64fcbd7b216950e3111ca0fa8ccf838cc5
SHA256d1bfed2ee9bb53b7df3a3ed91c799dd2d11ba36ee1f649eebf3604f8d7ce2d6a
SHA5127838925922509fe9945031447df92d13006c5d686a81911c126eda380e25dc135b64c7329f0a6f0dbcf0b698da9a2f45fc11206818ef1bb94f19132a41ab25cb
-
Filesize
7KB
MD586549e4c15bfa622a4a6db29466970a0
SHA16dee5bba69c8f68291229689c39e497442bf8d2c
SHA2566a02d258aa479af864c6c32661e6be60c3d5accce18e41aa49c4db81941d1cb1
SHA512099c16e4528da619cb26ca5a849af6adabe16eadd73837db8a7f69328bcc66f8137b9ccbfd6a2e7da5415331728f07ed80e6b966d96c307b46c50ca20686f319
-
Filesize
1KB
MD582caf090063c1c27a16f6e4561b1db68
SHA108ae5d1ddfbb2bccf1d116fcbc0713de2068ebcb
SHA256ff03bd28131cab51e850569a31af57092b6f063e4cb71228580638daba96970d
SHA5121839707dac0b41c5698bfe66f6de13ab69d3561a66ce300fd27ec167a77f4e2f57b6573fddd2656ac9146a25107e2ac4a549cd5437386abfb3a52bd78f551405
-
Filesize
1KB
MD5ddbb497c766a9463260043af91d92583
SHA1b439adec01062729949f715e395455952b683bfa
SHA256b56867e969faf671a2e1cd17b6f9a019adebfb86816108572f63123ced2824bf
SHA5122e08bc75b06433c64538f39157502264c11cb5c223efc3c2451d18e58b267fc83a7721d8e151f5ae50f3b93cc03cee10f6060549534e917f8997f6b32e02105a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD553d72699990fd0bcf2af4a666f946df6
SHA17796cd2188b559b7b4bc0c82eafddc1327060128
SHA256b02ac766a3389793add8402f8e70efaeb530e9fd0ead9990b727fb05e692291d
SHA512fd14d3435a11ffd5a9f090f494c17a9c2a98f2988166ca1921e5ce9d6cbe1cafcde860c3a58abf1d0c9106c1be71587cbe1772d3042a329f37d549ba660840e9