Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10R.E.P.O/Mo...tor.js
windows7-x64
3R.E.P.O/Mo...tor.js
windows10-2004-x64
3R.E.P.O/OnlineFix.url
windows7-x64
7R.E.P.O/OnlineFix.url
windows10-2004-x64
6R.E.P.O/On...64.dll
windows7-x64
1R.E.P.O/On...64.dll
windows10-2004-x64
1R.E.P.O/REPO.exe
windows7-x64
1R.E.P.O/REPO.exe
windows10-2004-x64
1R.E.P.O/RE...ss.dll
windows7-x64
1R.E.P.O/RE...ss.dll
windows10-2004-x64
1R.E.P.O/RE...rp.dll
windows7-x64
1R.E.P.O/RE...rp.dll
windows10-2004-x64
1R.E.P.O/RE...bx.dll
windows7-x64
1R.E.P.O/RE...bx.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...ts.dll
windows7-x64
1R.E.P.O/RE...ts.dll
windows10-2004-x64
1R.E.P.O/RE...th.dll
windows7-x64
1R.E.P.O/RE...th.dll
windows10-2004-x64
1R.E.P.O/RE...ty.dll
windows7-x64
1R.E.P.O/RE...ty.dll
windows10-2004-x64
1R.E.P.O/RE...on.dll
windows7-x64
1R.E.P.O/RE...on.dll
windows10-2004-x64
1R.E.P.O/RE...3D.dll
windows7-x64
1R.E.P.O/RE...3D.dll
windows10-2004-x64
1R.E.P.O/RE...at.dll
windows7-x64
1R.E.P.O/RE...at.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1R.E.P.O/RE...es.dll
windows7-x64
1R.E.P.O/RE...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 10:58
Behavioral task
behavioral1
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
R.E.P.O/OnlineFix.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
R.E.P.O/OnlineFix.url
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
R.E.P.O/OnlineFix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
R.E.P.O/OnlineFix64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
R.E.P.O/REPO.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
R.E.P.O/REPO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250217-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 47 discord.com 51 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 4700 msedge.exe 4700 msedge.exe 5696 identity_helper.exe 5696 identity_helper.exe 5184 msedge.exe 5184 msedge.exe 5184 msedge.exe 5184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2196 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4700 4960 rundll32.exe 88 PID 4960 wrote to memory of 4700 4960 rundll32.exe 88 PID 4700 wrote to memory of 4076 4700 msedge.exe 90 PID 4700 wrote to memory of 4076 4700 msedge.exe 90 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 1444 4700 msedge.exe 91 PID 4700 wrote to memory of 3708 4700 msedge.exe 92 PID 4700 wrote to memory of 3708 4700 msedge.exe 92 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93 PID 4700 wrote to memory of 2452 4700 msedge.exe 93
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://online-fix.me/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc16ef46f8,0x7ffc16ef4708,0x7ffc16ef47183⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:23⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:13⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4312 /prefetch:83⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:13⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:13⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:13⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6728 /prefetch:83⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6896 /prefetch:13⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:13⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:83⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7260 /prefetch:13⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7212 /prefetch:13⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:13⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:13⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16695806819597021190,1503147180655029684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1288 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5184
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x2cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD575eaa7ea57129889b391df4fd3c86729
SHA15d8555e627be5acea5ff9a5263bf98baf40b919d
SHA25644cc51cc76b22404e915d05ebe62c3c36346332f72e494fe449661c900809a85
SHA5124fdf0ff1e5acbea79c69d86bca9daab6213e9ab7a479065485634cb7a7b67c88bf2e6f0128d1c570676d774039b2424e724dc915ddfabf5de2e8a27ea8305ab3
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
255KB
MD5e80cdded42978faae0ba033638a524ef
SHA14bc7ca1769ae8f7d4ae1abbe58776aefb4d0beb1
SHA256f53ea4b855088dce71229d9760b4c6afef96a764daf95b5e3852cfdcc38e69cb
SHA512b02648b654c1223ebecba8fbb8509b8e608760f6f8063acc3bc39511e9bf58d20a47d3f81cb627e9cd0d3a86a6ac554a51aff1648723cf20e61775e79982a999
-
Filesize
21KB
MD534bab7e8f85684ff8eb66d9ab091fdb0
SHA1da72893e462ac4465e42bc73b7431241e64abccf
SHA25634e8ddc32161085b0a21111a6d1a598f26115bbc76f7b8b70240898fffd1b06b
SHA512bd47f6392c52d9350db1e5b2e79dcdb3b7bf1c0e3512489cc8584063a3cf115beb57feee9fa9eb9380473c7c9ee0a666be34dcd8c1b8e3e2f5f21f9e03aa3480
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5aaa96598841f79299a1081d55ee8cb82
SHA1d74cb76c904c1d0b2326c31c61db426a9fba01cc
SHA256f6f5a086c8281a399649c2d3e618f81425b4bcd84aa15a79e94282f84cfffad3
SHA512ec56a7ded94ddc2977b2a27d4f597dbb3af1e3b2e50bd98415e5f42ce66ffac2e8e4f83ba5707d31d490bec9ea7e90e0de750ae48e7528f8b36488bb0ecd7304
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD526e5114f2ac471157e131fb2a4eb8923
SHA102ed8f7aa3b0447050e984ef904e360079e1ff32
SHA2563b8e7cb20d668c7ca54642da947eb55c71bfdbc011aff06ff55fbaac27f0ac73
SHA512590951552763251e74b3263d4f35dd22c37b7791a25c847668ddf565edfa5db128865df5396dc81092bbe2e25a2d9882c595c779ce0212f465e328e7824a2739
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD54cae06df6edbb40f6951ad98f80ab90b
SHA1737caa3382d6bf17951bafc2288e48d05bed4a40
SHA2567fcbb86f5b81569267ccb68051018fb683482a64f004bce3c5835574b19f3f18
SHA5123b8879edda9a42ae0ced695656acd51d850bc37ebec2b311742f8425c1699abf1855035f9334075f5e3c62e1d27089793daf2dcba7a2d0b32ab15acc3abc6af4
-
Filesize
4KB
MD5b3c68e69d7b17b4765f2197c1547954d
SHA1d4531e35fc48f0dbf6d9ceff4e33baae368b4a66
SHA256683e58c6be7ffad1204e600444cbdcc7d225f02c4ed36cef3732cea537810065
SHA512adc191053b623af6d452f2fe14fada15a47a55f88a19b612988189e53cc93c4d819e760e11089c25a3defd321bca4ad85b4bbf357f7ecb613da0fd058aa07592
-
Filesize
5KB
MD523a28c73ed2aa82c07e29df72432a0ec
SHA18cac76df71d97c07a83a0fffbdb610fe5340d2e1
SHA256a8c4485ca06522f87d042a455abbffd6b827b76e87dd1189e8dc981e95ba5086
SHA512dad93922d344c0398c1a60c78164eed71ed9629afeaa15f6b581a7770cdca81f40ca773499e54112eb8900cd0e5c5fa2fdbe9c1875a20e82528d6d7e321fc9ca
-
Filesize
8KB
MD5ea4386ffc69b0c27191a0bad15cb60b7
SHA186f43f0f81331a3662608deed61f572880e9cca0
SHA256390c6c7a8e87d9f524e07225ff4e600ac58808c2b4fc66f1d26f338ca19a0470
SHA512c24d7f488f45e8debbc4d808df3a9d7d1f7700f6859af9b4e9c40955d6b2e2840b4510895df4c8968402f4eee456c1af3cf94bac177c4e7aeb6dfe2d08d89f72
-
Filesize
8KB
MD5fc2b6af2b6c414ae39cd9c1615ae4204
SHA1db13b2294fa7ffcba85b5a56788aa0c4391ccbc1
SHA2569d851e1f0c42aced03c61eaf633746b63f4deab2aa286459235f5df33a28aaab
SHA512bac44d476c2b94b4f8e4f2e47c97e01e8008824256483f8f97ea2d92bdf2449c9c581d50b49a8f7ccd356db6a870cb8451dbe1e17e863268e50d72dd42f2843d
-
Filesize
8KB
MD59d06e06d08e329bd22e82a70d7dcae55
SHA175e853eccc0909e22f15a174c3c3e50c41e372d4
SHA256e8623fc5d40eae96b11ac052c04961102f97e7c0b9f75afaee4418612c1ab068
SHA5123463d5b024124071df8185b94a55236bf99a52c18a1ab976ffef29f0d8fb0a649f775543e3119234b3377c15640ef8701781223c0f8bbea87cfa593a5a7dc64e
-
Filesize
1KB
MD520b71166e99be19c87adc292f630187d
SHA1529e2ad9a9585cf8bfdefea81cfbb074a8f675e1
SHA256d15870f9ab352abd72c2b6d170240c1a0b627e989c73defa01e74c9243417c13
SHA5123e734ffcd5b4d998d00b443d77c7b64ca55ae8f57cfaa4b1682bdd31b1e428a844879e429ae9ef12ed8d95a70c3e19b4f5142d68bed55032ececc2562c1a76bf
-
Filesize
1KB
MD52ac655dc6e8e979a3034a2534a647797
SHA1a9000729bd5d8825857f970101b4e39533761caf
SHA2564a3a8a12b55db4eb5b7ef12652abb731aa9a34deab3fc9a2ce76528c0b925832
SHA512ceae602b258be04cfec7fd37ca38315ea71cbd5980dd079d438b0d1ff2382a0d22d2db1aae85f2e384ea8e70b0cc36da1427c9d9f76990d117825d5e721970af
-
Filesize
2KB
MD59670fba5303ca664bb8a477d8c1b7d2a
SHA163ae17339c3a49f9bf0bb481aaae50f7ac67bcb6
SHA25614fc42743c40e142b8a73504ec31db9a2eb2ecdf8e906cae7bf3cf00c4e73de4
SHA5125407de7751a57e9928a5c918b88b1ba244ceef5feb00b34fe2275fccc6a6e99a5a6664a6ce3b4533077de3d1af014caa0534ef0a8763428a9afc32bb63cb954f
-
Filesize
2KB
MD5861a3484f48ed87293e8d2a1be2f2cef
SHA19ce684b0cbac6ebfbd0d72cae31f7ea8a0ab93e9
SHA256150116ae28224117feaa4a524edf4063558b5bb15d82d58b8e65c8f1e5aca3bf
SHA512ce3dd0f5bfe584dc1f1e9e0684b1b1bb40f5a1ca7f221a152fa9b4a8150fffc1ccb553af992b1dc90ee86943b0904560e4b33306ba16aba781835da974bc3e57
-
Filesize
2KB
MD59bdbf7cb3e8a33cfee813915a6b019a0
SHA199b1ab24177509c5c73840dfa2c9b7d6cb6b9648
SHA256a821fd8254f6bc3d1b82f48fe12a62a84fb7875d4d4ba5dcc25fa235869f4cde
SHA51247d975bef45a877ea93035590e1867a39a94227da8169cc97eb71345725c47256b68017228ff3f4d8189d9e6827e3805220dbe3c8bb1c04c8d80766dca382900
-
Filesize
2KB
MD5fb364d04e1f24b15245eae2d401e43bc
SHA12e5a30c040c801335c664bdf8f2af11329b8f366
SHA256ff0dad53073b2786881e80fae5460bdd02ce87c7fcc250fafacb09cdb78b5bee
SHA5121eb050701061163f208c26e209b6479cc94bd95bfe5819b855a08ec0f5b80247d5bfb8a2f1ebbfc0acb513dab160ca50e3b22b557b34727cf3daa519579cfb3d
-
Filesize
2KB
MD52f9a89cdb0973c31bfa05e822bbd9ae6
SHA1e59f417a61878b6ca5a81f116cc8c562f08da9ed
SHA25603a833fefdd3c4261c812b177636b6c0c64c10073d5f0c257b5bb83890fe6d7b
SHA5124dbb84e088d3cfe0f5a9b19f4e91d125b87f0e1d909378a65a391e9d603485096192c89f6bc6665fcd03cde1d2991b16d8911fab936844d46505d50095ac5d31
-
Filesize
2KB
MD552f00ea392930348050dea6adec3f012
SHA1678fe9b6ea50fef6ed368d5f39c98bce0e051d42
SHA2568b579de4595b282896879d0c4f4acea012c11246c9bbc9a734bc32af9b9c86d7
SHA512db56803914b361d38d40f8da4451791280c2d898d2de4a3c51cbb2693df0dfe7bd3b6dc6c84e2eb1ceef6fa095384a3930e72afb763752fd72f365d98f745c3c
-
Filesize
2KB
MD514d3b3507d6c1f2960a633f9ab3d5da1
SHA19e0a7f3f93a7fe232ec87232ea7b7cd58b59805f
SHA25603efd6440bc477a399f710b35dade4bec0ed8bea75c1771a954d1c6593f241de
SHA512dd88b20b1d3d4e7465d6b87845ffb6004d23af55ffc8f7e16e225701a184e7fcf3e2df5b9f2e4e118c51c3a79e9157bdd05613d1df53ea362d576dcb83b1456c
-
Filesize
1KB
MD55b5c3ed01325e17df549b1261b2a1371
SHA1ddd3c0bbb12d550afff59efadfcea4aba66024ff
SHA256ddb34a88ec22ac0e87e5a9083d85b3e34bf39b18b3720ee75edaec7a127d630c
SHA512e24eb3cded242657516b3ef01a90186ad1b715ac4306992d5dbf25079c7d84589f45afd3ca66e42ad29828e773b3967c16c8858d0498fa0e74765d4e97c4d1f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389