Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/03/2025, 08:46
250317-kpcdasvyhs 1017/03/2025, 08:43
250317-kmnzbaymv3 1017/03/2025, 08:41
250317-klen9avycv 417/03/2025, 08:37
250317-kjddeavxfw 4Analysis
-
max time kernel
112s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/03/2025, 08:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/archive/refs/heads/master.zip
Resource
win11-20250314-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/archive/refs/heads/master.zip
Malware Config
Signatures
-
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_602023704\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_602023704\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_245655359\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_602023704\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_602023704\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_602023704\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_245655359\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2188_245655359\typosquatting_list.pb msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866744745093170" msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{C26A95F1-72A8-4E80-B4FF-776CDC2B3D4C} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 5836 2188 msedge.exe 78 PID 2188 wrote to memory of 5836 2188 msedge.exe 78 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4592 2188 msedge.exe 80 PID 2188 wrote to memory of 4592 2188 msedge.exe 80 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4612 2188 msedge.exe 79 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81 PID 2188 wrote to memory of 4412 2188 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/archive/refs/heads/master.zip1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ffa1891f208,0x7ffa1891f214,0x7ffa1891f2202⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1864,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=2380 /prefetch:112⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2404,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=2492 /prefetch:132⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3456,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4872,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:142⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4880,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:142⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5436,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:142⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5520,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5844,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5836 /prefetch:142⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6244,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:142⤵PID:5176
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11283⤵PID:2612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5932 /prefetch:142⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5932 /prefetch:142⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=568,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5876 /prefetch:142⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6124,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=6764 /prefetch:142⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6784,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=6748 /prefetch:142⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=5660,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2012,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:142⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=5212,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4772,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5244 /prefetch:142⤵
- NTFS ADS
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:142⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4864,i,6611419780493244863,4795316563290479774,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:142⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5092
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5584
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Melting.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Melting.exe"1⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5509e630f2aea0919b6158790ecedff06
SHA1ba9a6adff6f624a938f6ac99ece90fdeadcb47e7
SHA256067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b
SHA5121cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD59f505ffc033711a73551746ce0ded32a
SHA18fea58afb953c12f63dad580db4a335d3ebbcc1a
SHA256ddc227c7660a220b45f0991da5c57d7e19054ee63d2b615e13fb82c9c7f594a4
SHA51221b49f1cac738ef0ba18c978325cdd49acf7c02c8ac52ec1a164a1012a84445415abbc38fc374a41c64f70db774382cd502a66a88a426a968a4c711999d5a8bd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD5de0d68415e6ff832bbf95d75ec4971ab
SHA1e9193b9d4354b2bd80a7cc2ab4987e48dd36fd69
SHA25640e90e3acb601d97fb00ee89e10fa79a977d990c3f7a41260e0eb86a11a1de5f
SHA512f9cabcbd35de11341f18301aa0efe6de63aaf541f1fa564bc470b5baebff99439c1adb1d67d22d58e5a7a5cc7bd20698bac928d37a41f4d2ce212112d25333f2
-
Filesize
37KB
MD59f0ffd8efdace10d32053e2190dd4551
SHA162a4a7219a04c66668f602e44bdf8ef4729761c1
SHA256c05b17a98e44292672aaa19bbfd56f8eeaca329d063b6e885f4a597c0ad28e05
SHA512e66d70f37b514d589048dfe60f225e9ee384ef76065a3eb127a91697a1c69c8c18fca59408396ada099f9a3e6a583f06f2eef0cf2a8b07323c7e6b91d1b304f2
-
Filesize
23KB
MD538bf789a1efebe99dc8e19e619b89959
SHA15162c4c723c70a301f925fbf6b28269f1a097fe2
SHA256a97f4ad1749e3d6b6351c8a400d27390e515a3f438f9e0dcceeae2558c0d29ab
SHA51219c327a2ac30ded0525874efac9c15606690f5ca02638221d6000d554b587acf36fe49f14788bc9c853b0caa530678c09c7d1f8d1780ebfbbd51781e48ed01e9
-
Filesize
462B
MD59cf7f27976e724089e806e535e5928b4
SHA13ac29e3dc1d906639a3f3279a8d822b2edc7eb56
SHA256ea1c2feb772f358d2d188f8dedf73da1e31dc2ad5c5e8345119417f7d4e2c5b4
SHA512e2cd52020112978f46c7c436965686abedcc7baaa041fc6d0eeacd7540c7dc1140dfc112122c21ed9049d967cead2dd62055ce18e0cecc3ddfe25d5da1239bf7
-
Filesize
55KB
MD525de6e2bed1f89e35558da37cecaac41
SHA1e495a2dc126c07505b9718e6930dc6dba0907808
SHA2563e30eed909ff07d54b3f9bcac69e10ff85255a3e3436bb6f22c122ec2ff5f750
SHA51284fa2beb0a5deceec86aa8fa5fae693e36ed40cc26bd64b5d098835be39524ab1209f38fe19deaa3cf19ecfa5a1d9e55e1ee538d3d7fa78cbc24f015dda92c54
-
Filesize
41KB
MD59135f291f24d09b5a7ee6cc65cc81f87
SHA141708354689f458a6d33db7f3067bc4ea3a92d40
SHA256a411fa1eb3187fdd30ad1a4a2be26250a1104207b0316e00057671fa0b493ede
SHA5128a54f84614a60815ffcf5affc2e8ab30b3c5321f5f96141f51999d67949335e3d522fa3398eaa01ede861b10d85d3fbb386871a849c4704fdd6e3ab36c9f00d1
-
Filesize
50KB
MD568b29d1abee32b37557d5a8e9e5cc979
SHA186d77a16fad07ad406fec8b414641f9dbb099f47
SHA2562c8d2c9a91f310e2888ea61f3d4756e97cc546f95bb37d03eae0f151274145a0
SHA512fc6b5d84839b62136829e4bdd4b0e6f992fafbbdff8382880f55f66c964c954dbeca360d9ca4322436ce2199f4afaad7cc1523601d44a8af256143b96df5cc12
-
Filesize
55KB
MD5baebf859d8c611e4b54e57f6c1ce4dd2
SHA1a67000013b4b64a289a4e66335ef7d06dd1eca53
SHA256a803724442002d732910fc265c23cf772db3cbd3b7cdc71e56a5e4b45d7fa2cd
SHA51288d9755947efb26682d099088338a39cc7cce5d0706c38f3f76d15751257cdac14507da50a3edefff2130d7aec2d410b306049853467eccaeb39497ea4f44cc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.17.1\typosquatting_list.pb
Filesize631KB
MD5094ca661fb20ae7e5c26df780e0f7ecd
SHA10cc79e2fdf43962d9597b7eec7b34c8983c3562c
SHA25676f100a3d96cddfbad67460eb0db1a8877a53c8a1881888b208011cd3a9d5726
SHA512088ca8996eb3bd02f5561b026a9e36755c915d19eb9ae768ee3949491059b1c7e34117b72828d843131df50456c6a162eb2cffe74fd38c273708cd4ac6fda53e
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
118B
MD5acb8ebb43624ece8dd7964092455d2b7
SHA17c61f04b419f927f98120afa18d8553513e2a0f6
SHA25655b2b1fd2a563b240179fde6335370f5e22068ada77b5dc5af50bbc379c72953
SHA5128e6c135aa19d6d21b32c6e9c0727ccf3df7e8dfcaf49e3f0ce55af9b53748188949746d69d17cdafd9d77511b1550d970289912a33b3d9c4daed8837762d91c3
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1