Analysis
-
max time kernel
90s -
max time network
108s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/03/2025, 10:00
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2-OFME.rar
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win11-20250314-en
Behavioral task
behavioral3
Sample
R.E.P.O/OnlineFix.url
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
R.E.P.O/REPO.exe
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O/UnityCrashHandler64.exe
Resource
win11-20250314-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 52 discord.com 53 discord.com -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_2009706679\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_2009706679\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_2009706679\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_1169181774\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_1169181774\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_1169181774\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_2009706679\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_2009706679\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_1169181774\keys.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5220_1169181774\manifest.fingerprint msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133871979193936240" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1678082226-3994841222-899489560-1000\{6FD8BAF7-45EE-428E-B9F7-8EF8961A377C} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5508 wrote to memory of 5220 5508 rundll32.exe 79 PID 5508 wrote to memory of 5220 5508 rundll32.exe 79 PID 5220 wrote to memory of 5912 5220 msedge.exe 82 PID 5220 wrote to memory of 5912 5220 msedge.exe 82 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 2348 5220 msedge.exe 84 PID 5220 wrote to memory of 2348 5220 msedge.exe 84 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4432 5220 msedge.exe 83 PID 5220 wrote to memory of 4516 5220 msedge.exe 85 PID 5220 wrote to memory of 4516 5220 msedge.exe 85 PID 5220 wrote to memory of 4516 5220 msedge.exe 85 PID 5220 wrote to memory of 4516 5220 msedge.exe 85 PID 5220 wrote to memory of 4516 5220 msedge.exe 85 PID 5220 wrote to memory of 4516 5220 msedge.exe 85 PID 5220 wrote to memory of 4516 5220 msedge.exe 85
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Suspicious use of WriteProcessMemory
PID:5508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://online-fix.me/2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f4,0x7ffe5c1bf208,0x7ffe5c1bf214,0x7ffe5c1bf2203⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2324,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:23⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1908,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=2376 /prefetch:113⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2496,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=2664 /prefetch:133⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3400,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=3444 /prefetch:13⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3428,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:13⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4120,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:13⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4852,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=4996 /prefetch:13⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5056,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5596,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=5600 /prefetch:123⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5444,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=4956 /prefetch:13⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5468,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=5724 /prefetch:143⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=5204,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5760,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=5028 /prefetch:143⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4812,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=5720 /prefetch:143⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6420,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:143⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6792,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=6824 /prefetch:143⤵PID:5460
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11364⤵PID:3428
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:143⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:143⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7148,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=7132 /prefetch:143⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6960,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=7152 /prefetch:143⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7144,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=4880 /prefetch:143⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6184,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:143⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=2064 /prefetch:143⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=4668,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=732 /prefetch:13⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5688,i,8861768580686871997,9573779329100662599,262144 --variations-seed-version --mojo-platform-channel-handle=4804 /prefetch:143⤵PID:5616
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x0000000000000478 0x00000000000004D41⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD519a88bad99bffbae6102e191cfedd75b
SHA1df476b325df883b73eda1b2349bab45aa22e808d
SHA2560d576dfbde1712b7288e4561e3eea75ffdad84dc50a77ceb57a6e9c37d60465a
SHA5129ec5eb487d8c8fc8e283a94bd43afd740edc4df6a4509d83629416d040586bd42330eb0da6dd41ec1e5550bce9a6643319ff8584f8638a9cde9042fa406825fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5f607eeb7881b67a542666a38568d702b
SHA15ed7855bf839f02f624c865fa4a3f669c1b5017f
SHA2563a8d6ca43029370dcb8b30c3225f5df6bd2daa3f546fd68fbfc83233b2f6c56e
SHA512ac7acbe513f19eb5c7810352f746bb4154e2926cf9e16fb6681596595c5918acd84a98d409301353c3c526e274f624a91a0eb4ee696bacb76c2d43ec942222a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5871b0.TMP
Filesize3KB
MD5482e8cf887bc8bc1ce13bb23415f04eb
SHA1f335bb60d22898f1e0e97c2b370a5a24205b0407
SHA2566ea84e39b831e20f4a257ef326e14e97e2ce52ce07a246db9345835ffe40ca12
SHA512add833c154651321b304da2ebd06be64aab3ef5b4b85f4be3f537577e50eac6c5ddff770d6ca0a813d10cc410a4432ec054bc37fb8abc2584b6c615d689e16a4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
9KB
MD57e85d96d3462672c967fe363e41b6bda
SHA1c99a11fd9cd6b9a694583adb3c0c279d26dd5c38
SHA256b812bd6667e98fbc9791e23cabd59939c7ffc255e9897acb0294c6eab13f47d4
SHA5122cf2dc4749d3c92df7348737013af5953895643bad13409d0ec42af9feb79b594e5dfcf2aed8614f65143e698a54d4509da9366c25ae6a8197cde5af1f86c796
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
18KB
MD5bc90d0135d24f96d0984a3fe83080322
SHA1eb42ef87bb9e9ec79da016a831d86620661c2d82
SHA256512ad97dacf92b28ff2c1b914bf1164b906ddc7f48f592b79d39812f41b891bc
SHA512ac5781de109eaab121fe21aefed3168b27d7069a81f43da5479e86d79762eb16838189d54b836d3818aaf44dc7f20fc3dcb5f52dc4095388764b05fd12f567b7
-
Filesize
37KB
MD56f60f41faab7556b23dad3d3bf0b2f06
SHA11b8c0dbfb59abb3b5850c9649648aaed222ec957
SHA2569b7590d8be1cd34d04f790518f492ea7d71d87ffd4ae22ca0f0f01dfef0bacff
SHA5125851715825bc9d13177efa337a1f256f338c0d8c3e89e72a942200d3e9c747d01a02c8ec10d4d5c34048674f737d8f7af26242599edca16587fccbc0ab918c75
-
Filesize
22KB
MD59915eb59580b8995988cc5477c7052c8
SHA1512aec084015aa16857324de15060c2eada04b9c
SHA25647b9e3e9e2b7aa26f3cf1eeb09a156239bdae3b1754d12cf3a1aa725bcc7c01f
SHA512a5ed0f976ec4521fbd099a3fb9928c1b4021d1c3e7cafb244ddec6392597c001bd654f76ac0886b62d93fd968df1c90ac15657eb8a36ebc2227bbd47513d5a15
-
Filesize
467B
MD55eea37237673ae3406cd09d47fd20cf8
SHA19cac5fca0b1fead9cc34e0b09a23d63b1dcd9f2a
SHA25600a39eb1487fcbf4714dc13e0cc92432180dc02d3a1cb4fa0469a0d783de8274
SHA5125091ceca0d4d6aab941e9b4cffa25a6ed0a126a21ea0a28c3534016481da802532adcc7aa506c6558c5e0acc0f353bd96128af150c235b3eeca652f29636aab9
-
Filesize
22KB
MD5167924ea68452f777ad964472bfeeccb
SHA1c29a4617e1165ee0060282f1e3a9cadbc7cc4974
SHA25619944c25c24e06867bd522af825ec4f65486f5fe8908513349aa1df73b9dc84a
SHA5129177c6ff15410a65806c3c07a6ad88901018ceb1290e2109a3206a5387afef7f8bc35206c1692ce37aec3d8042a381503ce9e2aaf8a3c0c1ebd9511923e2cf24
-
Filesize
900B
MD5fe9b5293887b37c4c91dbec2da981fd5
SHA1144010dd9da6437c779871d46f8afd058bfdb927
SHA2566c29d9a1048997320b984ad15b107a27ebc77b2442fa7b8aaa899eae1d7494bd
SHA51250d7b012093420e59e31dc4a62dce0b99221de1225a9f383c472f3b65680aa2af50ded4ad5cc30303324367f4df78df35ba25b54eba8105705bda3dbe117cbed
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
50KB
MD5af3be0ed227e57b65726f05ef9ee8a83
SHA160ebb57f8ec836fa97d7c63fe2f7ad173d4e1fb5
SHA256f8291044d9f12c5b3b2456409340a91a882c080306150373cc21b32fc72b3d6f
SHA512b67e6206019af7b2a86694796d689b6e47b6f9f2f65a999037470dc9ff0fba0f1a9b2476d4d052fecf45377362616640f1b996d4d2813fc60235a163ca2e0f2b
-
Filesize
41KB
MD52cb9fbee7e8e59429d55f043d36d076a
SHA1f56576a7c8623d949e3e462b72eff52f3c151f22
SHA256b2f8244679ea6d3eb7f4f727ea846f85116c0bdf49647cdc10777ae6e0e7f538
SHA5121a5236c0228472e821dd93ec6c84c15733b824395fa01ef49fd7c105c8d8a6364452f122cf478e79eb6e5268a50ae19d7871a77dbb197d7c1d2fb17729c0ed26
-
Filesize
50KB
MD53491603564eec3dee8f4ee68cb4949b7
SHA1ee2725a811b76edd9b14921c34b356e13c55e25f
SHA2560e285b990b933e85f179bbb28f6655f79a35d795a766f18f6b0c4aa831e39dd3
SHA512ccd530a1c04576ac24ae7f0c2c24a11085435daa1baefa30461ec297c59a56b5ec21efd9e662fffa692aa69c067fb34b31e7ceca947ddcfdb747eb2c78160a77
-
Filesize
55KB
MD59fe2fa94a158f4d872d066e270329d17
SHA1e74448eb371982c86d0f5b4e892624628ac82f9b
SHA256088da6898fcfaaa2e15da4df1c26a649e3cf46a15e92d8666857a28335e2a5d9
SHA5126dfe57583222dd25d4fa0c08da522d52831fb02196622c7ded9371a3e6b4e30d3e44830335410cb6d48c00562ca6d566f6825efd3e69416fcd9143f5a1c81f72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1