Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://reqdme.clicks.mlsend.com/tb/c/eyJ2Ijoie1wiYVwiOjE0MDU0OTEsXCJsXCI6MTQ5Nzc1MTE4MjE2NzI1NzQyLFwiclwiOjE0OTc3NTEzMDQyMzE5OTQ0MX0iLCJzIjoiNTVjNDE5OWRjZjhmMDE5NCJ9
Resource
win10v2004-20250314-en
General
Malware Config
Signatures
-
flow pid Process 174 1604 msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873200191614101" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{C54BA00E-2C27-4DFE-ADAE-E6196C6B2AF2} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4956 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4956 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1780 3604 msedge.exe 87 PID 3604 wrote to memory of 1780 3604 msedge.exe 87 PID 3604 wrote to memory of 1604 3604 msedge.exe 88 PID 3604 wrote to memory of 1604 3604 msedge.exe 88 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 452 3604 msedge.exe 89 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90 PID 3604 wrote to memory of 3968 3604 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://reqdme.clicks.mlsend.com/tb/c/eyJ2Ijoie1wiYVwiOjE0MDU0OTEsXCJsXCI6MTQ5Nzc1MTE4MjE2NzI1NzQyLFwiclwiOjE0OTc3NTEzMDQyMzE5OTQ0MX0iLCJzIjoiNTVjNDE5OWRjZjhmMDE5NCJ91⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ffe38dcf208,0x7ffe38dcf214,0x7ffe38dcf2202⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1840,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Detected potential entity reuse from brand MICROSOFT.
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2272,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2604,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3448,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3456,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4128,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4360,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5224,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5528,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5696,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3652,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6460,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6484,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=6492 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6460,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6724,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=6700 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5368,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3536,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:82⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7076,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7084,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=7096 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6760,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=7116 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3748,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7092,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3672 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7044,i,2465934275529472009,15892356678017673939,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3248
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x338 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
287KB
MD582a330234e93b7fcc0a6c467e3434c44
SHA142422d652e1561be0f3598e3a911e9005942e236
SHA256a8ef4ded0f5c0c6e28c6a87c9bc924d2181a72d5eab4401692b5ff8876c9c3b2
SHA51212eb0612f574964feab08cc31976693063e6469f34f40fd2b6b48d27b351bbef4a941ea107d38920540fa8e69514b853a4e36481ee8b96f0c161019eb7d7b5dc
-
Filesize
215KB
MD5e8518e1e0da2abd8a5d7f28760858c87
SHA1d29d89b8a11ed64e67cbf726e2207f58bc87eead
SHA2568b2c561b597399246b97f4f8d602f0354a979cbe4eea435d9dc65539f49cea64
SHA5121c15b65bd6b998254cc6f3cbef179c266663f7b1c842229f79ff31ba30043837c398d85296fb20d3a576d9331fee9483ca0cbd06270da2d6db009bc454aee0c7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD542a0f5adc49e61d654de139d23256677
SHA118dcdd7154d472301bb929819e49126b44131cfd
SHA2561141c90e0df4ca53a62a3c7207298ece2058db770ceb4eae19f196b824959f76
SHA5120dc5150d36676f60e4ed58e75fb7c583f03e51d48045deea81f43ebb67d8e32b41e0222197c0f059497769ed319618b9d007d1b9d4dedf82f298a034746afb49
-
Filesize
36KB
MD5f60143ecaf6ad3a10d237682cc6b892b
SHA1a967ffbeaff7189cf12bfe513c8e44a38a0bf47b
SHA256460a5484ab36d4a27feb6b1b05a28a6cf5fdcb87f86703f34e1cb5199df30877
SHA51253e365e7b33f5594cfabb7e819bdcddd6c62846435217be01499a5e0ce1f14712d031b1e994c29aae2f79fcdaeac1bdea45ba23c62da0c45428dd4e4311447f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f42ed9911ede1ed6d7ba840c85a61491a4a3e39b\index.txt
Filesize126B
MD5ef64b2463d42f49ef2859ebec61d7e72
SHA129816f66944f30b03ffce03a464a5c39ea898fab
SHA256238e645354c410a117e5521aa9a85b246edb4618b0cc2080b180919156ce7f91
SHA512a95f09c49a80186a93cb6cd1d7b5cc6b1a5e2453dfe9c5b350a53e50e33886862838dbc0b04d2b0abece392a48d4f421a3e68bee6eea534a86caf0051c8d0d34
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f42ed9911ede1ed6d7ba840c85a61491a4a3e39b\index.txt~RFe580097.TMP
Filesize133B
MD579310329a4da8f7bde3a9a876223138a
SHA1e2143f466e7e50ca058e8dbcb678575250e07f4b
SHA2567fb0f550cfce8fd4576c7a87cb46abd73c20ecd5774298e6d594b7db542c96c9
SHA51285e68ab86920fdafe86b3efd3418d806d270276dd6ca51384204c727fba8471291718ce5b7f200bd020b3239b6f3ca5d0077df3712d36fb59643b6cd5f2de3bd
-
Filesize
4KB
MD5962dfbaf60ed0e10148aa677783f543e
SHA180e17764639f60be865a1f9d50119fd6920137b8
SHA2566e14836e9d4c80334f9061553a7c6aa0e084bd2005abf8d5835b015e1bec1122
SHA5126d6797e4ed4c9690bfd4a6f544725bc7625c46b51a4274a8b862f4b51707544c3f3c62d3d1e774a8c0b85af656528473ae7047866716ba90e7fdfc54d654dac4
-
Filesize
30KB
MD5b26ad896e9bb6bf14d1637f8c8cf2b85
SHA1d1c556c02020d23ab2d77c92c684b11ddc57225a
SHA2562cca6c9d5c1ce36593e57efcb7ea204e85e84cb249e52861190fa8ffcf4ff8c2
SHA512bc813bc0a3813e9bf1b1f85884cc680cb6d6f576df58825edc228808bc5247d8a8189a1d55f6acc3d735e27c2c6fa85d0537cb7c6b143f2e8c2f9abdea35919f
-
Filesize
6KB
MD53a67318a4e3f9e41c13362f59af2ca18
SHA10f2193b849ce8b933258cf545935bf6bc4c7a49a
SHA256e02816d42310df9415ce1bfabbfa39c60475017aaa91e90b43f1ab7300c35847
SHA512d759a6c5375a10de0b50df9965d3a5c23557e3267846d2c1819199eaacc2c3425b607c80e62dfffe84a13931bf396008207a4f10a1736c4ab5ce4caa421812cf
-
Filesize
7KB
MD59135aad3b141709f325998da5e02ef0d
SHA18750c1433e28ff6fc2edbc46a4475b62b508e6a9
SHA256f7ca2eadd5dd3bb336e9ec1a709283cc7b9a887b00b32a8bed70fd6e1b4d276c
SHA51242e8fd39b389f5012efd2396f9d9b1efcac4103cb63f5c0da98a48564f91ffd35563018b1c9d435ad3daf8771390cbe65c8511f6ff3f70d1e726ff6825de6a49
-
Filesize
392B
MD5276737a7218073092f677d2ac420bde5
SHA13398b1d939d0e3a5c4118dc6228c07705d11de9f
SHA25644d2a8d2605ae787f887b35774058d7360be9d0ab43e1de7c0bcc68137719461
SHA51248b264de2f253729c280df3f540f34e53df8e36a5ca5e461b9abcd777e22adfef358a02d51612b2a2623bac65f46987e80c6d723c2ce5c5d23bd2a1592df9e46
-
Filesize
392B
MD589e01e82da286781edca724a111ede8d
SHA10e4da483ff165307eadb1f9febd4c2be8310931d
SHA256242ff2e5a2f303d3db588495fd9ed2b0a92d8137cb717f1a1e1d9a4ece3b297d
SHA512e62c3034406b51f5d522f285f0d19b94982854168ddca314b96bd79a99caf3ff34ea7fd000ef0408d0ffd7c5ce6efdda1db2eaa27e4c1b0c2705e3b85c9e1994
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5db0d8ffd6553c9afe0e5583b1f9c7261
SHA1e2ca15fc5cfe189fc72cf581eebd8f0e9da8cad1
SHA256e09e30a0ff7e6873bb9ff1dc9e79934e910402f6e7289c48db23ccf198e225e7
SHA51252eee9bb1d4ef1e0379a099001309fa49fd703ededa6d2057d96c0006534929239ef56f1b6046a88787ea12a0d2d36b3599dde001aca97ee7c2ae7a93336a8dc
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21