Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/03/2025, 15:54
250322-tcp83awvbt 822/03/2025, 15:52
250322-ta25vawtfx 622/03/2025, 15:45
250322-s66bpszmv6 1019/03/2025, 16:38
250319-t5tf7asps4 819/03/2025, 16:34
250319-t24sraywgz 1019/03/2025, 16:30
250319-tz5bhaywez 1019/03/2025, 16:29
250319-tzg6zaywdz 119/03/2025, 16:26
250319-txvdhssns2 819/03/2025, 15:43
250319-s53jesysez 418/03/2025, 23:39
250318-3nfnfatky3 6Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/03/2025, 15:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/Mobile_Legends_Adventure.apk
Resource
win11-20250313-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/Mobile_Legends_Adventure.apk
Malware Config
Signatures
-
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_99349760\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_99349760\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_1080786928\protocols.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_1909567396\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_1909567396\nav_config.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_1909567396\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_3404330\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_1080786928\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_1080786928\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_3404330\office_endpoints_list.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_3404330\smart_switch_list.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4444_3404330\manifest.fingerprint msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133868726167124848" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1136229799-3442283115-138161576-1000\{14F58D51-CF08-403B-9B03-904E90F840D4} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4104 4444 msedge.exe 81 PID 4444 wrote to memory of 4104 4444 msedge.exe 81 PID 4444 wrote to memory of 4856 4444 msedge.exe 82 PID 4444 wrote to memory of 4856 4444 msedge.exe 82 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 1340 4444 msedge.exe 83 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84 PID 4444 wrote to memory of 3876 4444 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/Mobile_Legends_Adventure.apk1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x2b8,0x7ff9ca25f208,0x7ff9ca25f214,0x7ff9ca25f2202⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1864,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:112⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2100,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2488,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=2660 /prefetch:132⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3444,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4060,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4124,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4144 /prefetch:92⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4256,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4252,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4424 /prefetch:92⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3640,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4084 /prefetch:142⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4236,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:142⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:142⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5972,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=5872 /prefetch:142⤵PID:5104
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=9643⤵PID:876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6132 /prefetch:142⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6132 /prefetch:142⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6100,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:142⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6452,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:142⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6548,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6552 /prefetch:142⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6592 /prefetch:142⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6400,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6444 /prefetch:142⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6532,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:142⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6680,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6412 /prefetch:142⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6404,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6688 /prefetch:142⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6440,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6428 /prefetch:142⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4152,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=568 /prefetch:142⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4496,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:142⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4452,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=4728 /prefetch:142⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2452,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:142⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6012 /prefetch:142⤵PID:128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4564,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:142⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6884,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:142⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4360,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6888 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6236,i,2697643121082800435,6946268969518482409,262144 --variations-seed-version --mojo-platform-channel-handle=6444 /prefetch:142⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bf7af050db5466deb1d5279a4495ff17
SHA1fa74c17c0858a06097c8e7d870bab4ad99330d5a
SHA2568c4b35c6c624143b59d3d45af76d0b7a84b5134c757f3ec25320c9c1c383567e
SHA512d84e349049a913bd11004237749785f554906c1f48932dcb65345943480800dc9653d033dd46b09e1f4b47ef87530c631660f4f48ef524e34bbe9237d1d60b46
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\manifest.json
Filesize134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD5046b1cdbd636e82e7711ea1fde31d7e3
SHA1f5fa4183cb259a99b4148ee957a5f76e80a77ada
SHA25640328502d95af4c1db45d98abe8c4e9214d80a8df7f0b8f19f81edd5e121f90a
SHA512460ba5792f0df64289ff4057d04615973a7844b2fd2c14df554600c141d720fcf13d9e9c8449ac57e50fa074a81887437918970881b4d48f7a7ee3521bac8eb4
-
Filesize
280B
MD5cbc9fc2d9ad2df85283109b48c8e6db0
SHA1721ea0dfafd882d6354f8b0a35560425a60a8819
SHA2567c21b286b304b2b42ab3502158aef04892b60c63007b8ed7172dad86a4bcebbe
SHA51209594b5f33704cf367960376e5abc8cbfa7baead59c3f199ffd365a9a9c2159b45f6596d597ebdd033db5436c000faac3c5b2fb39e97fc17b102d03831265609
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD50a636ba413bdf810ffdcdab9631857b0
SHA135b8d0a756a43559521c3d2c59ba1556fff7a0b6
SHA25625c4ba151c6449d48a2a0c712993007128accc6b6e6b7efba7ab0e0fef2cc9a2
SHA5127f72bc16a3249aa44d1d434d40c0edae4672d28c77ce9c1b847ba15a689c017c42682de76ea43a74642c9c02816afb708e9693a2d0904eccfeac37100855da52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe581817.TMP
Filesize4KB
MD52e6c59720addaf80422d0532b4cc59ff
SHA167333553b6d2846ebcc8580717f9e71bb77dd014
SHA25600018f64cfaaaac4faf6bcc837a1c6a383d57b80f474b4faa4921d25f4788d20
SHA5126b723e8daf2cd294c2fafa67563b3f915f3bf1edcfc87fc00f8cfe022de613d79d3102a58672e28b1815290d628cb44d48d4298521cd0f6037df2bcfcd286592
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5eddab91f9bed62ea419fb9f18cd6c736
SHA1203ddf260076b61df8608bd27692a53ba751543e
SHA256cac8042955bd0c1191419eead945d7409794c91f534e927f4f1a94e260e7ba08
SHA512893716be2e667345beb17703094190fa06ab83194042c6f73d255a0883d6d3838e8c8eb8463e8fee5585437903c5a65a28bb432a74228cdeee065a54a81aab43
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD57e6902a2ca346d4738f74c2c4a62a0f5
SHA199a4492b4f231c83b997ef1e9771336bc7feafe3
SHA256c4e48c229a5496fe0c61bbb6accc96d3464284aa6a4fedd8979604d08eb19241
SHA512a75946b62228caa98e5bb1d1380e76feb17703e7e63aca649a7a2915a35ec9b4ac4dfdfa531b1010fc9ae09b09b7d11a18cddee6ba5056b380e4526809f6c920
-
Filesize
15KB
MD566e35951e1ddcf4481c17f3a43f644b1
SHA13d859e03b89ac9df8ca1f96a4463228065ca13c3
SHA256bbad7b5b8203de2020d2adb6ae51bf16b55924aa65f0f75563c50a77a9f49ef1
SHA512d669902d15f58be8cd1e7f12b07771185f3fd1147bf5ed2d1f3cb817d29f5e9d111cfcff3462f290a6100d177acf12874b03f4d4538d8363664147567b3ec36c
-
Filesize
37KB
MD537529cdca87d1640476c9192f9a8ec90
SHA1a262f5a59e71441c36c5d8dea5fb052c2c8ffd12
SHA2561d43282366d114df08bee6d3f24c78e84bb6b31fd464d833b79a85c059d9fc6a
SHA5128c7b6de6b6f9dd4e6268c6e3d790572da525701d7dd94447417751aab6126946efd7c9f037320d30e96d993c368705a3d91d00a907c3f791b7543d63a60864f5
-
Filesize
880B
MD56863c3fa96f5035adb5b93b4ebcdcf4f
SHA13589f911cbc10151669470b1533e1e6dcf2ac715
SHA256674647090f1461de468d905bb793538275af7ef319f6d9e1823472cf42fb7333
SHA512d31c5626a14115580a6ccb8b35e217bea5c50f9c4de9d01fe1877f8374b7843d907adf76595dc38eff497487466c524c1ef2be851f23887e6a2e2af4e9b71b05
-
Filesize
21KB
MD59d67c68cd2b313fa9700548b9f524ad6
SHA1aa9a5796693553ee35f7773f4af8f0d46d25c441
SHA2562652083db7286ccae278dda9631cbca82fe0d02e234784418699cff6002183b4
SHA5125a14d82ed65f8685c3d3d2e436870cdd3f51e827e70d6aa871be4364d14ac628954cca1b82158c88215102f7cc7a8f28637adad22a7e95483a85a8d69eed6e5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe588548.TMP
Filesize469B
MD5d2a3f00a43f393a4345eab2ed9f24a21
SHA1aa4841329b2d399b68d5c13be1e370f9d5958999
SHA2562e640ce6c001792d733ce4a6987e96defe84d7ab9e0131298eda86c0f9f7afa8
SHA5123fa38a55687616358858a9bd18e7b23a71a2c1531df59fe1908717b732ab895ffd84149fb00106ba6f4b95ed98cd891113b8947a125a4107b57575049c295cb2
-
Filesize
20KB
MD5622cf13abe8c4ba81acbbe4070f8d70a
SHA129c39577de789602617632a1ee745e5897805fa7
SHA256b91863cb7dfb695e04f8be6b437f67ba669d1cfbd407a3418cccf12919c7dab4
SHA51225d382c5ef4691018d62f05e28a6d2c321218e1586646b2e628350968f2475d30a13c53c5055bea16451111b1c566e53003af3e2afe3a9e5a3785255069c23f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe58875b.TMP
Filesize2KB
MD5ee334aba4dd4fb9caec2da190449504a
SHA183d86913e3555e9a83208a777607a621965e9d77
SHA256762156ec3519d73a52878b137bd506781d5ce93e10336f2010ec52ea9ab78536
SHA5125863b59c91b1045cb69c5a8feefc32d579f615c3d1480d13369aff2cdf521e7d991424c4edb61f58b1da763e0bbb98f02cc56b0d9fc01236db2f4acc799b58f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
39KB
MD53df82b9b1f59d2a95f30c2f6949c25e4
SHA1a968d6bb8e9f6d8035bb31971626ce855c0cc25a
SHA2568a23c48b9eb011839d15fb0659e07ed06eaef1de7d8e6249d98ab881ae7d9574
SHA512d633c0812d4429ad3bf80593efb1f53943400b6b2e6465f611f22cd9e2fa460efb3c972319753aa5463a2cfe0a2e59426f8044f1b6f8e7b6c5031f8158eaced3
-
Filesize
7KB
MD558d051ebd6b1424d3b84b365fec4fa16
SHA15ba2b573d2688bb0eb2b592a3b5a2366ac346260
SHA256f49ec0ad3e23ee85284b61559830db1f6c220bc26970d7860a4d0ddbc094c266
SHA512533cd81c7d784c3837ce08a336d3c756400b4f25b7e5f84e5aeaf3b3255df612938dc098ac0a452e12faae468559c587e70b57a17129abdf922fa8671fa64134
-
Filesize
30KB
MD59bfffe8cea5a5be9e871891e318a612b
SHA15ce6763fbb383161f9264256dfee3a615b36628e
SHA256749c0e3b3a763946df5ce1ce5fa2470ed3eddabbf18fcb4787fd7c538f01714f
SHA5128ae7687625f8ef090e327a4d6501cd41736522165fa1349387419be826195d8ed6a08cdd1301e2b845273ff04e298cf47a5afd7433a32796787497e5c6745882
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4444_1281326635\cc88d3c3-35f0-4ea2-924b-875822245925.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1