Overview
overview
8Static
static
3Launcher.zip
windows7-x64
1Launcher.zip
windows10-1703-x64
1Launcher.zip
windows10-2004-x64
1Launcher/N...s.json
windows7-x64
3Launcher/N...s.json
windows10-1703-x64
3Launcher/N...s.json
windows10-2004-x64
3Launcher/N...er.exe
windows7-x64
1Launcher/N...er.exe
windows10-1703-x64
1Launcher/N...er.exe
windows10-2004-x64
1Launcher/N...er.exe
windows7-x64
1Launcher/N...er.exe
windows10-1703-x64
8Launcher/N...er.exe
windows10-2004-x64
8Launcher/N...g.json
windows7-x64
3Launcher/N...g.json
windows10-1703-x64
3Launcher/N...g.json
windows10-2004-x64
3Launcher/r...eb.dll
windows7-x64
1Launcher/r...eb.dll
windows10-1703-x64
1Launcher/r...eb.dll
windows10-2004-x64
1Launcher/r...es.dll
windows7-x64
1Launcher/r...es.dll
windows10-1703-x64
1Launcher/r...es.dll
windows10-2004-x64
1Launcher/r...og.dll
windows7-x64
1Launcher/r...og.dll
windows10-1703-x64
1Launcher/r...og.dll
windows10-2004-x64
1Launcher/r...nt.dll
windows7-x64
1Launcher/r...nt.dll
windows10-1703-x64
1Launcher/r...nt.dll
windows10-2004-x64
1Launcher/r...ng.dll
windows7-x64
1Launcher/r...ng.dll
windows10-1703-x64
1Launcher/r...ng.dll
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Launcher.zip
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
Launcher.zip
Resource
win10v2004-20230824-en
Behavioral task
behavioral4
Sample
Launcher/NovaLauncher.deps.json
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
Launcher/NovaLauncher.deps.json
Resource
win10-20230703-en
Behavioral task
behavioral6
Sample
Launcher/NovaLauncher.deps.json
Resource
win10v2004-20230824-en
Behavioral task
behavioral7
Sample
Launcher/NovaLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Launcher/NovaLauncher.exe
Resource
win10-20230703-en
Behavioral task
behavioral9
Sample
Launcher/NovaLauncher.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
Launcher/NovaLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
Launcher/NovaLauncher.exe
Resource
win10-20230703-en
Behavioral task
behavioral12
Sample
Launcher/NovaLauncher.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Launcher/NovaLauncher.runtimeconfig.json
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Launcher/NovaLauncher.runtimeconfig.json
Resource
win10-20230703-en
Behavioral task
behavioral15
Sample
Launcher/NovaLauncher.runtimeconfig.json
Resource
win10v2004-20230824-en
Behavioral task
behavioral16
Sample
Launcher/runtimes/browser/lib/net6.0/System.Text.Encodings.Web.dll
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
Launcher/runtimes/browser/lib/net6.0/System.Text.Encodings.Web.dll
Resource
win10-20230703-en
Behavioral task
behavioral18
Sample
Launcher/runtimes/browser/lib/net6.0/System.Text.Encodings.Web.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Launcher/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.Messages.dll
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Launcher/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.Messages.dll
Resource
win10-20230703-en
Behavioral task
behavioral21
Sample
Launcher/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.Messages.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
Launcher/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.dll
Resource
win7-20230824-en
Behavioral task
behavioral23
Sample
Launcher/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.dll
Resource
win10-20230703-en
Behavioral task
behavioral24
Sample
Launcher/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
Launcher/runtimes/win/lib/net6.0/System.Management.dll
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
Launcher/runtimes/win/lib/net6.0/System.Management.dll
Resource
win10-20230703-en
Behavioral task
behavioral27
Sample
Launcher/runtimes/win/lib/net6.0/System.Management.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
Launcher/runtimes/win/lib/net6.0/System.Runtime.Caching.dll
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
Launcher/runtimes/win/lib/net6.0/System.Runtime.Caching.dll
Resource
win10-20230703-en
Behavioral task
behavioral30
Sample
Launcher/runtimes/win/lib/net6.0/System.Runtime.Caching.dll
Resource
win10v2004-20230703-en
General
-
Target
Launcher/NovaLauncher.exe
-
Size
149KB
-
MD5
3ab8bb4b8a880d1eeab5a703b397c97b
-
SHA1
0919d29602e3c51efa232f69f6891116c840c7eb
-
SHA256
1b559687e555d6a3d13ba3a32cba23df5932ba16c6df594a6ca9ac6b30462f3e
-
SHA512
2747dbf1a6c9292fc5eea06d81202a0534a5fb22ec12f91affb7f204df53c4d9a9ab03f73373001b0940762e4418b2645a93fc27635443780612d0f44996294a
-
SSDEEP
3072:28vbzyQ6Y1YXrbNK+3FNxacPEMk6aRQAcTWG:2szAXNK+3FVGRQTTW
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 359340.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 3896 msedge.exe 3896 msedge.exe 456 identity_helper.exe 456 identity_helper.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1508 1016 NovaLauncher.exe 85 PID 1016 wrote to memory of 1508 1016 NovaLauncher.exe 85 PID 1508 wrote to memory of 3676 1508 msedge.exe 86 PID 1508 wrote to memory of 3676 1508 msedge.exe 86 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 1032 1508 msedge.exe 88 PID 1508 wrote to memory of 3896 1508 msedge.exe 87 PID 1508 wrote to memory of 3896 1508 msedge.exe 87 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89 PID 1508 wrote to memory of 268 1508 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher\NovaLauncher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher\NovaLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win10-x64&apphost_version=6.0.12&gui=true2⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcadd646f8,0x7ffcadd64708,0x7ffcadd647183⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:13⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:13⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:13⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5428 /prefetch:83⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:13⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5968 /prefetch:83⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:83⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:13⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:13⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:13⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:13⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,9439576366945964967,13911769811678296389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2772 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5dc56f59c357baaceb9d9e4afb7d0df0e
SHA18f7c9efa4d4d1c3de47d7096bb53ecf0fa315383
SHA2564c12b6b919f6fd381496b5063bc4e71b2aa0abcbbf72f456aba6cdb30c5b86f1
SHA512d35676841425348bc7215a3e61c1dc0af7a4e81c6c6f640b00bde353dc063a2615b74990f459930bd443c4556d867419761df117a5672debd013a3bec9bb6a3c
-
Filesize
1002B
MD5e61b4fce970985a3bd1e5630bc9f7356
SHA14953f8aa827a2b577887fc456343c6c488386f38
SHA256152fbedf7c293dfbfbac0ddbb84d28b440051fe472432ec5a6fe683e59a8264c
SHA5129a5be2bf8dc262116e20150403da4f828136cf8ff49e88bfc8f76ebf0b7595c697ec81a6b2c117c8befbdce2939b1d62f77e12b29ae06549708196e0d25a68f5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5099945d04c57e4436f3125136450cde7
SHA140a4d78552a9cf05cb6779e019ed7570ab5801ba
SHA25661dc5ed95e5379f17b905b0e3f08d6337160a5ca8feb6b9a2af3aac05a297afa
SHA5128bc039e7c0c14a27b330cfe3d16ba257855a1302e41b8c87d8f1e3ffd30c016e39c9143056694cb1729a7b63843cf9d1b66fbb6ba9e305b7ebe93e7ce4e0392c
-
Filesize
5KB
MD522a15b309b203bcac2ae54fb11c0a90c
SHA1ba7ebe2e178411ddcdc7e756bfabc705be20e86a
SHA256de953eb16ffb5125cdad607e7d4ecb2213ae6112b76d28ca341468f907afb7e2
SHA512a97068eafb3a5e8b56f5f4a8f0c54c6fc7ada4701f274c0dac3070dcb58a3d24c76d9ecc3316d79c546d15de5d59f6571305ecc079e087e9e1bbd84f46aac75b
-
Filesize
24KB
MD55a478f1e08816969e8214f982850b754
SHA11cf5e7192f3c6e31c7e27b6cb34ebf89036eec0c
SHA256665cf5612c61412c9acc928b1e155c8f11ae83905ce614d9a1a7ad72cc0fd489
SHA5127e7ff60c157841f6f5bb206ebbce29f6df3a6c0c671805415ad7226654e13da49ad76e39a6d0afe28992348f3b5685ecacbfb44178fd61998c54caebbfd97832
-
Filesize
707B
MD5d83358ea058ba815ccbfd650bef7e0ac
SHA122d92c63a035da50b70004dc8b0326953f82bba6
SHA2569f2a5a1242b304918e355ac88817cc3f9e2ecb694b473e1193335e75e596324e
SHA512b8216d319051069c43dbe3e3430c50e3d830c8831d54a2e32054eb84f15874eb1d687b7dd3fe4134d22440f9981815d9685e37e07639293935ca83f7643b9aec
-
Filesize
707B
MD553910a3e748ca1da33cc0ace05b7f731
SHA1f602f9ded521352973e9c0af47f44b15c2d439bb
SHA256b74a3db6aed63cdf5ce844e1ac8f2ee788ba92d0f46ec4bdabb7eda06d54f6b1
SHA5123e99d8f83b2e2e6a61e939cd702f83ef77b2aa60cd77765adf936b5be050b4c938ac780e60d41f61495d5ef13b218905b09a4ae1658989d88c404015d131e539
-
Filesize
539B
MD57b94c1e26d6ea6099042f10d8636e1df
SHA1a96e7665cce5c183d90a714096da98eae1e93ad6
SHA256e57714160738809da14050466c50f8addffc1a3e112cbc3a152f02af5f266202
SHA51229bc0e762f7def9653da69e9e1e745daf7ded5477ec82a8c2db0788418e82a306919a7d00a0a8f6740e202b688b718f33b7c79a4516b25034f395e6752371e61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51ce57993bb841296e3ef860692e4ed7b
SHA1461e15e017e18f160211321dd11c43854cdfd7f7
SHA256308c590db659931955e91cff05483808cb74e760ca04d59b29c8ea7174320244
SHA5120164ea34fd09aac3693a88d3f48ceeea719bf8f9e43cda1db6b596f1235842fd7aa8706ce83cd658b0fb80a731f131d50037f88d4c8628fa77222b2a0b54cc4e