Overview
overview
6Static
static
4Desktop.zip
windows7-x64
1Desktop.zip
windows10-2004-x64
1GameAssembly.dll
windows7-x64
3GameAssembly.dll
windows10-2004-x64
3Launcher.exe
windows7-x64
1Launcher.exe
windows10-2004-x64
1OnlineFix.ini
windows7-x64
1OnlineFix.ini
windows10-2004-x64
1OnlineFix.json
windows7-x64
3OnlineFix.json
windows10-2004-x64
3OnlineFix.url
windows7-x64
6OnlineFix.url
windows10-2004-x64
6OnlineFix64.dll
windows7-x64
1OnlineFix64.dll
windows10-2004-x64
1Phasmophob...2).pdf
windows7-x64
1Phasmophob...2).pdf
windows10-2004-x64
1Phasmophobia.exe
windows7-x64
1Phasmophobia.exe
windows10-2004-x64
3PhotonBridge.dll
windows7-x64
1PhotonBridge.dll
windows10-2004-x64
1SDKVersion.txt
windows7-x64
1SDKVersion.txt
windows10-2004-x64
1SteamOverlay64.dll
windows7-x64
1SteamOverlay64.dll
windows10-2004-x64
1UnityCrash...64.exe
windows7-x64
1UnityCrash...64.exe
windows10-2004-x64
1UnityPlayer.dll
windows7-x64
1UnityPlayer.dll
windows10-2004-x64
3baselib.dll
windows7-x64
3baselib.dll
windows10-2004-x64
3dlllist.txt
windows7-x64
1dlllist.txt
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 13:40
Behavioral task
behavioral1
Sample
Desktop.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Desktop.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
GameAssembly.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
GameAssembly.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Launcher.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Launcher.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
OnlineFix.ini
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
OnlineFix.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
OnlineFix.json
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
OnlineFix.json
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
OnlineFix.url
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
OnlineFix.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
OnlineFix64.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
OnlineFix64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Phasmophobia EULA (Ver 2).pdf
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Phasmophobia EULA (Ver 2).pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Phasmophobia.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Phasmophobia.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
PhotonBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
PhotonBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
SDKVersion.txt
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
SDKVersion.txt
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
SteamOverlay64.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
SteamOverlay64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
UnityCrashHandler64.exe
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
UnityCrashHandler64.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
UnityPlayer.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
UnityPlayer.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral29
Sample
baselib.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
baselib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
dlllist.txt
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
dlllist.txt
Resource
win10v2004-20230220-en
General
-
Target
OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\8bcb8c7b-54ee-4a5e-9f47-c7477a9c100e.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230402154305.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 232 msedge.exe 232 msedge.exe 2712 msedge.exe 2712 msedge.exe 5312 identity_helper.exe 5312 identity_helper.exe 5184 msedge.exe 5184 msedge.exe 5184 msedge.exe 5184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2712 5100 rundll32.exe 82 PID 5100 wrote to memory of 2712 5100 rundll32.exe 82 PID 2712 wrote to memory of 1276 2712 msedge.exe 84 PID 2712 wrote to memory of 1276 2712 msedge.exe 84 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 2068 2712 msedge.exe 85 PID 2712 wrote to memory of 232 2712 msedge.exe 86 PID 2712 wrote to memory of 232 2712 msedge.exe 86 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88 PID 2712 wrote to memory of 2324 2712 msedge.exe 88
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\OnlineFix.url1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://online-fix.me/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x80,0xdc,0x100,0x40,0x104,0x7ffc981b46f8,0x7ffc981b4708,0x7ffc981b47183⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:83⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:13⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:13⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:13⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:13⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:13⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6320 /prefetch:83⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:13⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5700 /prefetch:83⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7492 /prefetch:13⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7440 /prefetch:13⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6884 /prefetch:83⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3212 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1c4,0x22c,0x7ff692815460,0x7ff692815470,0x7ff6928154804⤵PID:3396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6884 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:13⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6564 /prefetch:13⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7768093082255605529,17021418822936711558,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6536 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5184
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3528
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x494 0x4981⤵PID:3964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD578c7656527762ed2977adf983a6f4766
SHA121a66d2eefcb059371f4972694057e4b1f827ce6
SHA256e1000099751602ae1adcec6f1c74e1d65f472936817b45239dfed4b043984296
SHA5120a8e58ae95163b3cdf8e81b5085887761e73cb7c836a1a6a972e837fb3df69b2ac70cfd6311d06d40656344ec35eb48e512f007561480f0345486ac2b329be0b
-
Filesize
152B
MD5099b4ba2787e99b696fc61528100f83f
SHA106e1f8b7391e1d548e49a1022f6ce6e7aa61f292
SHA256cdb1db488e260ed750edfe1c145850b57ee8ab819d75237a167e673116a33ee8
SHA5124309375e10785564ceb03e0127ced414e366a5b833f16a60d796471d871b479e4c044db5268902d9dfd14715ca577cb26042bab8f7b0f31fe8abf33947feb9d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD52aa8241a6fd83b12681db878e0f225f2
SHA1645cde98070078fd37824dccef46decac0f7f19f
SHA256a8a2b4717a5f8600c85be215ffb2b58d4497d3350a203b67e36d753a749094a9
SHA512a5c0ab25e0c80392eb8cfe28f3efeb50fb2d908c72772cb02b562e7a42fdc17cd1bbe02f64543b4880b21401c9b4dc157c29b25ac78ac6fe8e48e46c44e594bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD59bbe1a454ee7e16928a243c0fc6e5517
SHA15f1bd92a285b278bbdf9d7ccb4f8a5585e66ef81
SHA25674be81f3bd8f4fd9664991810919f165b278f51f52ae41bc34b2d063ad0cf278
SHA5127a7552e6cd9564aad7d98427c111e5d057c18f35589046f3eb8c63ceadb8cd1e12653e70dc7f03fb4d59a77b693239b10218fcdffb3fc637226c50ae6b126caf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize96B
MD50662383f20dee182c115fd3894a128c6
SHA1276c9e8d67f8f621c79dc114bc46080b6d7fef0c
SHA25614bd93343320c2137db659ecd211bac597953c6ea8098ec8121034b592a69f76
SHA512c821f0ee53da48dc4adf69bc570e81c0785a9cff7e9f4f540bff1ec5435049937d3cdf5d19dbe2615bf88805916a88222ab48ca5f5e8bd0ffc26727b749a4902
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD5f128019e79d0dbbef638f6955b9699ed
SHA1ce41b4e0b5fe9c3afdfb49ceba13237712719ea9
SHA256305317b2d8a46d6c86730c32ddbbd66e1779888a774fbaf02f435d110ed87a85
SHA51284ab213abc4277b6b4ae5e0df8c1b5dfe0a6305ccff0f584fd8795869519dd30f1ce1016e7e7140c38cab7878e38baacbdfbec818c3791a922c2c939bc667829
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD56a9d19951b0d6f41fc5b7a4ebde75c09
SHA163f17d2c8175ac8b812ef5194b414b515a428486
SHA256e9122de9376384c0b03fb04fe2179ed0271b712bb9425595050270d7386df025
SHA5126caf22fbe16db5ea39dc9f46ebaba95390300a8e3e25f4859a58ce53437b21c801bedc0bff61ad7d56ad52663b41f967f1433ff83ba7a22589d37b61183fbafb
-
Filesize
4KB
MD5b5bd9d691878a3446d585acf3e8c3b73
SHA1c6ac78330d5b0dab4bb9bfc22555cfb9b2791062
SHA256c8af2d176db5a28f8bf3362401345af414f4ed0e48f12bf5e35ca097b80cbeda
SHA512d1c3c402efb498b77f1a10c148b855986abaf04a396f2e2fad02fdabb66250e323d192229c5df7f210ef95676436cbc3fff0742e2546afc2a2007d697644f648
-
Filesize
7KB
MD5eaaf72262ab9201c4f0bfe6d4d0134ef
SHA128489f8b2bc227df6e739293b2965cd95e4292f1
SHA25658c3d7f1cc31c9643b84fb1f9a47e9b4a61cd991d4044106e8acff78bba949ce
SHA5123674b087796c979b39f854702309cdeab6cb39bf0e1d24fccf39ca146a9edf3766da9ce18851fa55f5397dd2b55aaec694abd6619671ee5c1786582dc05a56c7
-
Filesize
7KB
MD5383060c88137474171175a8471366e33
SHA1e67bea73c40032be628dff15079eeaa8e9a512c7
SHA256dca67ba7b30993141dcf6d99e04d6383cb8e3f53c3f3c59b9ee8187a480ef175
SHA51225c3c5d0dc30ae6c12db97e75f12ff067d4d9b55fc8ef4b5bb332642845146015b1c1925eb9eea096cc7af1d61b8b18badcdabd07c3da7fddfa3510a1118d4d9
-
Filesize
24KB
MD502ee7addc9e8a2d07af55556ebf0ff5c
SHA1020161bb64ecb7c6e6886ccc055908984dc651d8
SHA256552d3ed359b7a52278ce621674d16428d8a7969f6cd5663df18e240cce66aadc
SHA512567989543c3848a0c3276d96b96ca761f750e4b71fb74f36d809f590ffe16a72fd5ece251737a8b1ffe65f0051e211bd7ad19d2b8b0b7ca1b7ffc86dd2a52883
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5461ac859171506d4f5d161990e228f7c
SHA13fea067d39395a2e78eec5ed9b492fa142316ce7
SHA256108b180ae9e99f66b5987b1a45dd2060ef601b4b57527983a2dce30f6c39305d
SHA512c83af6f00a944d7a032d68384d0a875d8c5ffdeae89489eeaeb992bc496e9a2606bc5a2e16bb78e065b1874f80323d84b8f11457a6bb3710e69a184bf4b780fd
-
Filesize
1KB
MD506721846473ed65e492d15f1b9a02010
SHA16cea44fef9c5a4f9ce9169cb5fc0d8a3930f82d7
SHA2563e7783b63d1a0d8b876babd048c63f2f540c26f58ae0bb2a76d7afcc23cda685
SHA5126386aaf94f8f225625124d3f70cca0d6fc03081d2a8aca6958b610ffc288f05350e0be908c99e595bb51421e3c928b5e71af7b872f319098cbcf1fba8d695abd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\baa71091-8a57-4664-96c6-a2e758b5138e.tmp
Filesize4KB
MD5ed650abbadd3a473fb97934c1b7e65b0
SHA12fe05dacde07f5ffa25cfcb7707de316996a2a8d
SHA256538cf52b17669738291b83d264e70282906feb156301ebab6ad3f8f12030e62e
SHA512e12704fb7d0197d05613efc7c074b7dd719862fe605af60eca17df609e4841ce7e385ff49cd43db3904790447575b00e6fc965f9ad1c806124f9fa6e79681b26
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
9KB
MD51c51606de859db9f7bb52d1d6a0f820c
SHA13586c5be8db1a5f4ef1a0866ff486331280ed07f
SHA2562e6ed60006234ee1fd241a6892426298bf46c13643feb67634cbfac700777ad0
SHA512d4c693ae957bebf74713d5cd8bd8687da68ec7ef536080719ce5bc90c26a8f790112dd0cf2d5408947fe5fdf95428c49700eb3ece15493ea813a1bcc8404caff
-
Filesize
12KB
MD5eb5017cd10c25da4e06e0de203d2af9e
SHA1fe0e97d9393f35edd566c88e20f83f70ac768f0c
SHA2568372d449222b931055398e85d5116c529b9c49bc690a2f9d508cd8ba62de5b25
SHA512a2748e6430eefa1fafdf2f49ce457908d993661d50926a155e04fdb6bebd0ff99dce53687671472be746b7ebf3508d1e9e97df35f5922db1afbd97f7efdd1bda
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5021c9a471444017a24b0f49cbd7fefd6
SHA1ced37e5f8040bfb536b835a1a0e6f45614db71bc
SHA256a3650b12c2358a366d44d140b0c6a92f42658ddf29ce4f494be4f12c90dc06b6
SHA5120cdeb631f59c19026368b4fc0d8c2b40eabff469632e2a81854e66cddd156367035afefface4f514b39414692a3841b9343136af3450d2d7a55a460fe23bcebd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD54974f5f5a7aab224521c5943b2a98b37
SHA141725a8e880e13b1aa23e4225fece3f840be472f
SHA256bb1aec8144f10011d44f712a433b70a9d2e2c62e308ec51c9933ebd979965ff7
SHA512127f7cf7a9ba43b3f219f1ddb5b4fb4fce21d845b2252cd2f184dab488a623c9dc07bd937b89666f6790d8053982a383304aaa6a4b19c77aff8a65bc83122379