Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2025, 10:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://r.oblox.com.co/communities/3719430513/Terminate#!/about
Resource
win11-20250314-en
General
-
Target
http://r.oblox.com.co/communities/3719430513/Terminate#!/about
Malware Config
Signatures
-
Drops file in Windows directory 22 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1845646806\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1715562380\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\auto_open_controller.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1845646806\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1715562380\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1715562380\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\edge_confirmation_page_validator.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1845646806\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1845646806\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_1845646806\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\edge_checkout_page_validator.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\shopping.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\shoppingfre.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\shopping_fre.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\shopping_iframe_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\edge_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\edge_tracking_page_validator.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\product_page.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2180_380854239\shopping.js msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{83D9926F-71C6-4AD4-BCDA-2C25861F7061} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4632 2180 msedge.exe 78 PID 2180 wrote to memory of 4632 2180 msedge.exe 78 PID 2180 wrote to memory of 5092 2180 msedge.exe 79 PID 2180 wrote to memory of 5092 2180 msedge.exe 79 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 3580 2180 msedge.exe 80 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81 PID 2180 wrote to memory of 5152 2180 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://r.oblox.com.co/communities/3719430513/Terminate#!/about1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x268,0x7ff9e9bef208,0x7ff9e9bef214,0x7ff9e9bef2202⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=2576 /prefetch:112⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2488,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=2408 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2128,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=2628 /prefetch:132⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4748,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5032,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:142⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5356,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4216,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:142⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5188,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:142⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5996,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=4896 /prefetch:142⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6204,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:142⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6204,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:142⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6384,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6284 /prefetch:142⤵PID:128
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11523⤵PID:1952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=568,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6520 /prefetch:142⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6308,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:142⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6300,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6228 /prefetch:142⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5816,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:142⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6712,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:142⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5820,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=6716 /prefetch:142⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6508,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=4896 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6020,i,7283725987407783686,4857800901229415152,262144 --variations-seed-version --mojo-platform-channel-handle=5280 /prefetch:142⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5509e630f2aea0919b6158790ecedff06
SHA1ba9a6adff6f624a938f6ac99ece90fdeadcb47e7
SHA256067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b
SHA5121cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD54c9379c509b735551647326ee4e55e9a
SHA16a9fc65976cd22242456071e588144c6e173b345
SHA2560307720b444141bca4f677ef7f8c7192ac3d04dc41da8fdc2a8cca79dbf2fe7b
SHA512e5c134d0a129ff3a5e7e4b70f3527ca797a1d0c23780f1c1edd1c685e472d32f9ad5a81652163948f0882e90dc559378c45f638b908c29b37dc6e04f6f95351e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57cd33.TMP
Filesize3KB
MD5aed8568ae577d3fbb2d1fc29b2703eb0
SHA1f4445349ae9067b00e1d5a91cb7f5934270afc83
SHA256e582ad75adf005f9b5e2680d183bb4fedf60411e26e249f0bc6fea14432dae60
SHA5122d0523caef95d74c6ae3fa2ae4289877b6fc06dbd1a773901151bd29700b5bdea767fe46f441803e7075874383e07443e439610ea983d1a1d2aba862526a92bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\86aea249-c093-4912-9429-aafe8cc985d3.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
5KB
MD5d366e0a34aff8d52be3d41afd0fc85c0
SHA1d40fb2858829883a12066c77261013f87ba340d7
SHA2563f4e651dd9762e1371a77823e295260fdcbce3a7976ba48dba3c7785e391f035
SHA51295512819f66bde457e3117e54cd89a4471547b9716f81d3f172d168ebf7d4875f0bd4eccda5a46740d59f293c59820f120b3b48b9ee69e7a67d4a02e2fd23e24
-
Filesize
5KB
MD5ee6b8256bbf6e124ae169380bf6c138b
SHA173614bf75a1b65e1ca0d3768701bdfe8384b65fb
SHA256a7aa524202691af627e02ac33bfc6f1b09724934c57b531c1b4986df68635815
SHA512524befa37cb40f8f1eee3303846f49da4901b3d2b10e0f05870231390a78eacbc744843defa09f570f52739ca43abf86b194bf85cbf383abc3bc9526fbe9a314
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
411KB
MD514700211b4d935cf0c36030e276c9476
SHA101a5a200b7368110359e8bbe7a0302e60bcdff62
SHA256c33351b7843e3c80f6aca9fc947b6425ea5e2248fbee757d7f77b918e557cc77
SHA512763e29ba1988064d5af1d4a83f60d252f49f13f385b9ea18d97cf2f7ae555c1f1b3a1b7ca849eebb4aede9e6a4323f9fc0ee4c7f6ffa2dc1df98637440c18850
-
Filesize
411KB
MD5b61aa4f1df53656e885fbc0d6cf4478c
SHA10e2f0c87fdae3abe1204caae2b2e9ab5306638c7
SHA2563dea7dd3e5107f74bb54b3e541aabde2a6db3b7fe6ed56e836748852c58f2190
SHA512193348c3017b60432bf676428bfd1f222740e71d218828b0e7c8ff25f68e56b86e1544b5b511483162ec5a7f23dd95dc07dc00e85c4d11eb9ff66b97b0ad278c
-
Filesize
411KB
MD5020aaa171498728d15eb33049ac51fed
SHA1cc6e352fc4da7af2c0999ac9cbe91fe8d9b7767a
SHA256eb51689af48dae8c6d7c7711ef0505d0d35a39b0637a4c4ec356f4c605253caa
SHA512f4a55c90aad56ff46e0dac0152b438ae7dc488178008c3f0db6108f7d427c58be1091c97cac5487dd66c54754e2047ce8256c0859996cdab3c324325a51ce827
-
Filesize
37KB
MD55bbc8d19d75e32a5b350e249cc5b2999
SHA16cfac451a7c8fd22d921a7af1dd37429bc89b257
SHA2565c88fee1b03890d55f020dfe55f84486fc0c07b3906eb9603634c3cfb500deeb
SHA512b142c1e9499e3de39805edffbc7e71fc71f9b9d7331db2f153c87886a18c9589308642cfa142332e908c727750957e2ba3120b8358ffb9b16799aac88c651201
-
Filesize
22KB
MD5ec76d39c75fcc581d9b0cba14c619177
SHA156f896bd7a931c6c222725c544505601e8a9d0b9
SHA256d4d681c0c5e6c61435a0a8e96ab1d137e4cc7226aa5b23cf57b9bfb048db28d7
SHA5121d1386d64c23dd6748cc48d8b95a803de21884c5081030e5245df3eeacd415011ac9a16d230e2c605dcdeafccf0fe3b30a5d0ff32b270715b1e5fb940682709a
-
Filesize
464B
MD5b026ac160b4c693186413a0ddc4c7e8d
SHA1cfbcae5e9098ab010af4f8989b97318ad4fa5e3a
SHA2560aba05bb15aefac268edcd7e8873b1b596fc9584feac5155305012e72a9dd582
SHA5121a849aae101fcc30d9774f43152fb32c0c6e7e1f46938a57bdc6342873811bac28ba32adf2af78e046083435f2c2639b981ae0ca13c7d3e7f8deeb86c336cbbe
-
Filesize
41KB
MD5d481f52baee1e7a8d0cd6d8ee0b8fa70
SHA1cce54222500c267d4453c4a550375584e60f5da3
SHA25682a947c5f0bad596929954d1f24b8484fbb345e8caa8c29aa8c593d10c8898d8
SHA512e84ca4fdd8c80cb0d1b04550175bbd70a44c9de78bdfb22fd0055cdb25bb98277d45805b038e4d0a6d5d4cf3b01b7ff73eed08b8de2e1de3240ca40346f75c7a
-
Filesize
41KB
MD5bdfd6a840ba0f342ea7e4579a4d3880c
SHA18903d5fb8678893a2278e630ba5ab31105375fba
SHA256b67d84c4c6c81deb432f1f75208d477c1273eb558240b1b677f99d7bd7c1b354
SHA512015aa2a0c1fe8c1cf22654aed2cbbc8c3e788b04a27a0fdf34177cc590c5226214f1a86415e871c54a18a008d9b5a950e5947d7e2ba06775d88651e8238cde72
-
Filesize
50KB
MD5b2b0215196653a2e094ed99f8610b4c0
SHA17afd6728cb5b22a972b934a1fb78ae48545a7516
SHA25616e163f50974da9f8ca40cd8aaa7d1d80323f183e7cd1b313118bab839ed1895
SHA512be62aaeaa21321105473328658fa8825abea73299442c32d52ee6b0c22bb36d4a759b83ceb54fd5d961ed2a116e4ab6a3f7c98879df3621ae6674688e8191a9e
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
145B
MD50df2306638bd60162686e9c4bafbd505
SHA1ef9e16bf867f7950d5a30172e1d34d38686b0e72
SHA256fd7b554588c5e72506a0bfed89bc298911a5649b9f5168ad7c1804d1c75de42e
SHA51273fca229097631104cf352061d62455b6c5520bf59777520165719d2368b0e77f3ce66f52873fec53ac60e35274bf397ba321bc62610f0b7b172a7c5c4975174