Analysis
-
max time kernel
77s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 00:21
Static task
static1
Behavioral task
behavioral1
Sample
4a60ce8e60857e32c0c7a6ebd2ac119e.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
4a60ce8e60857e32c0c7a6ebd2ac119e.exe
Resource
win10v2004-20231127-en
General
-
Target
4a60ce8e60857e32c0c7a6ebd2ac119e.exe
-
Size
1.2MB
-
MD5
4a60ce8e60857e32c0c7a6ebd2ac119e
-
SHA1
a0d52683c28d4bd6ca098592f36a0ccb4a0d3142
-
SHA256
1824e5015f86de2efab633fa3e0d8a43d7ab980fa200a77008eb2e39a66909e0
-
SHA512
ccccbd48becc57b64858576e39740c173d5d40d4bfa2c3edc9125f6b6b5cc699af50c64bec2637c7e61fefcea7e519bfba47e20070297cdd9385556c1d731a8d
-
SSDEEP
24576:0y21NUQPd4O7ecCW91WzRKtb2yXRDPw1NFpSUC1rr7pL5M7o4BbWx:DYTDK7W91WzRKBzDirTabhaBb
Malware Config
Extracted
risepro
193.233.132.51
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
eternity
47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q
-
payload_urls
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
Extracted
redline
@oleh_ps
176.123.7.190:32927
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2712-642-0x0000000000E00000-0x0000000000E3C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1uu23kN5.exe -
Executes dropped EXE 4 IoCs
pid Process 5104 IN7IH24.exe 3728 1uu23kN5.exe 3224 4Fj223YC.exe 1900 6kS9vs8.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1uu23kN5.exe Key opened \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1uu23kN5.exe Key opened \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1uu23kN5.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a60ce8e60857e32c0c7a6ebd2ac119e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" IN7IH24.exe Set value (str) \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1uu23kN5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ipinfo.io 25 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00080000000231f1-99.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1uu23kN5.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1uu23kN5.exe File opened for modification C:\Windows\System32\GroupPolicy 1uu23kN5.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1uu23kN5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2288 3728 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4Fj223YC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4Fj223YC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4Fj223YC.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1uu23kN5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1uu23kN5.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3896 schtasks.exe 4352 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3728 1uu23kN5.exe 3728 1uu23kN5.exe 3224 4Fj223YC.exe 3224 4Fj223YC.exe 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 5440 msedge.exe 5440 msedge.exe 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 5796 msedge.exe 3228 Process not Found 5796 msedge.exe 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 5896 msedge.exe 5896 msedge.exe 5456 msedge.exe 5456 msedge.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3224 4Fj223YC.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1900 6kS9vs8.exe 3228 Process not Found 3228 Process not Found 1900 6kS9vs8.exe 1900 6kS9vs8.exe 1900 6kS9vs8.exe 1900 6kS9vs8.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 1900 6kS9vs8.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1900 6kS9vs8.exe 1900 6kS9vs8.exe 1900 6kS9vs8.exe 1900 6kS9vs8.exe 1900 6kS9vs8.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 1900 6kS9vs8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 5104 2380 4a60ce8e60857e32c0c7a6ebd2ac119e.exe 86 PID 2380 wrote to memory of 5104 2380 4a60ce8e60857e32c0c7a6ebd2ac119e.exe 86 PID 2380 wrote to memory of 5104 2380 4a60ce8e60857e32c0c7a6ebd2ac119e.exe 86 PID 5104 wrote to memory of 3728 5104 IN7IH24.exe 87 PID 5104 wrote to memory of 3728 5104 IN7IH24.exe 87 PID 5104 wrote to memory of 3728 5104 IN7IH24.exe 87 PID 3728 wrote to memory of 3896 3728 1uu23kN5.exe 89 PID 3728 wrote to memory of 3896 3728 1uu23kN5.exe 89 PID 3728 wrote to memory of 3896 3728 1uu23kN5.exe 89 PID 3728 wrote to memory of 4352 3728 1uu23kN5.exe 93 PID 3728 wrote to memory of 4352 3728 1uu23kN5.exe 93 PID 3728 wrote to memory of 4352 3728 1uu23kN5.exe 93 PID 5104 wrote to memory of 3224 5104 IN7IH24.exe 108 PID 5104 wrote to memory of 3224 5104 IN7IH24.exe 108 PID 5104 wrote to memory of 3224 5104 IN7IH24.exe 108 PID 2380 wrote to memory of 1900 2380 4a60ce8e60857e32c0c7a6ebd2ac119e.exe 113 PID 2380 wrote to memory of 1900 2380 4a60ce8e60857e32c0c7a6ebd2ac119e.exe 113 PID 2380 wrote to memory of 1900 2380 4a60ce8e60857e32c0c7a6ebd2ac119e.exe 113 PID 1900 wrote to memory of 3808 1900 6kS9vs8.exe 116 PID 1900 wrote to memory of 3808 1900 6kS9vs8.exe 116 PID 1900 wrote to memory of 4872 1900 6kS9vs8.exe 118 PID 1900 wrote to memory of 4872 1900 6kS9vs8.exe 118 PID 3808 wrote to memory of 3252 3808 msedge.exe 120 PID 3808 wrote to memory of 3252 3808 msedge.exe 120 PID 4872 wrote to memory of 716 4872 msedge.exe 119 PID 4872 wrote to memory of 716 4872 msedge.exe 119 PID 1900 wrote to memory of 1840 1900 6kS9vs8.exe 121 PID 1900 wrote to memory of 1840 1900 6kS9vs8.exe 121 PID 1840 wrote to memory of 1360 1840 msedge.exe 122 PID 1840 wrote to memory of 1360 1840 msedge.exe 122 PID 1900 wrote to memory of 216 1900 6kS9vs8.exe 123 PID 1900 wrote to memory of 216 1900 6kS9vs8.exe 123 PID 216 wrote to memory of 2724 216 msedge.exe 124 PID 216 wrote to memory of 2724 216 msedge.exe 124 PID 1900 wrote to memory of 5004 1900 6kS9vs8.exe 125 PID 1900 wrote to memory of 5004 1900 6kS9vs8.exe 125 PID 5004 wrote to memory of 4956 5004 msedge.exe 126 PID 5004 wrote to memory of 4956 5004 msedge.exe 126 PID 1900 wrote to memory of 5040 1900 6kS9vs8.exe 127 PID 1900 wrote to memory of 5040 1900 6kS9vs8.exe 127 PID 5040 wrote to memory of 4184 5040 msedge.exe 128 PID 5040 wrote to memory of 4184 5040 msedge.exe 128 PID 1900 wrote to memory of 5364 1900 6kS9vs8.exe 129 PID 1900 wrote to memory of 5364 1900 6kS9vs8.exe 129 PID 5364 wrote to memory of 5384 5364 msedge.exe 131 PID 5364 wrote to memory of 5384 5364 msedge.exe 131 PID 3808 wrote to memory of 5400 3808 msedge.exe 132 PID 3808 wrote to memory of 5400 3808 msedge.exe 132 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 PID 4872 wrote to memory of 5392 4872 msedge.exe 130 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1uu23kN5.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1uu23kN5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a60ce8e60857e32c0c7a6ebd2ac119e.exe"C:\Users\Admin\AppData\Local\Temp\4a60ce8e60857e32c0c7a6ebd2ac119e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IN7IH24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IN7IH24.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uu23kN5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uu23kN5.exe3⤵
- Drops startup file
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:3896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 17324⤵
- Program crash
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Fj223YC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Fj223YC.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6kS9vs8.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6kS9vs8.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:24⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:84⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:14⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:14⤵PID:6436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:14⤵PID:6696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:14⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:14⤵PID:6980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:14⤵PID:7152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:14⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:14⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:14⤵PID:6296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:14⤵PID:6912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:14⤵PID:7244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:14⤵PID:7292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:14⤵PID:8160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:14⤵PID:8172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7444 /prefetch:84⤵PID:7676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7444 /prefetch:84⤵PID:7716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7324 /prefetch:14⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7664 /prefetch:14⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7644 /prefetch:14⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,16966970009176440353,17590762340103504094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8128 /prefetch:14⤵PID:6188
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login3⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3501916575043738107,15544508361103102954,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:24⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,3501916575043738107,15544508361103102954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15781804770500305558,4176866297611437400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15781804770500305558,4176866297611437400,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:24⤵PID:5788
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login3⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14349695413251434630,7965774068963630446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14349695413251434630,7965774068963630446,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:24⤵PID:5888
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login3⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9163554105751485197,1399227839072999831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:34⤵PID:6528
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform3⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:4184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login3⤵
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:5384
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin3⤵PID:5700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:5816
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/3⤵PID:6512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:6688
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:7132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffeeb0e46f8,0x7ffeeb0e4708,0x7ffeeb0e47184⤵PID:5536
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3728 -ip 37281⤵PID:4348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\294D.exeC:\Users\Admin\AppData\Local\Temp\294D.exe1⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\846E.exeC:\Users\Admin\AppData\Local\Temp\846E.exe1⤵PID:6132
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:6864
-
-
C:\Users\Admin\AppData\Local\Temp\tuc3.exe"C:\Users\Admin\AppData\Local\Temp\tuc3.exe"2⤵PID:7256
-
C:\Users\Admin\AppData\Local\Temp\is-4NMBU.tmp\tuc3.tmp"C:\Users\Admin\AppData\Local\Temp\is-4NMBU.tmp\tuc3.tmp" /SL5="$70234,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"3⤵PID:3484
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query4⤵PID:3708
-
-
C:\Program Files (x86)\xrecode3\xrecode3.exe"C:\Program Files (x86)\xrecode3\xrecode3.exe" -i4⤵PID:5752
-
-
C:\Program Files (x86)\xrecode3\xrecode3.exe"C:\Program Files (x86)\xrecode3\xrecode3.exe" -s4⤵PID:7648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\879C.exeC:\Users\Admin\AppData\Local\Temp\879C.exe1⤵PID:6192
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:6432
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "AppLaunch" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AppLaunch.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\AppLaunch.exe"3⤵PID:5776
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8A1D.exeC:\Users\Admin\AppData\Local\Temp\8A1D.exe1⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\B7E5.exeC:\Users\Admin\AppData\Local\Temp\B7E5.exe1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5001e6accd2295500f29c5aa029f13b83
SHA1ab18a2236828927b4c0927fe97991f395f587b9b
SHA256488b5425924289b246663eb3e7820375e20335c948e1116c5e06a46ab6306df9
SHA512295630689f1e63fa6d9f32dcbf54df669d87570deb0cb12b7b2f804a02a54fc5c9a8b94da3addbe0398da019816084ffd6639a9430e868500a5361c9c2eaca95
-
Filesize
152B
MD59757335dca53b623d3211674e1e5c0e3
SHA1d66177f71ab5ed83fefece6042269b5b7cd06e72
SHA25602f0348e2af36f2955efda1613dc6480f1c68c8e55f19590b7b58e9355c6a940
SHA512f13351398f5dd5b6cf638b174dc50ddc782b690c6d4736d48941923a3425b5dff4a9aa0da22773e9abc9559d40f020f268018db902e0a7772b7b1f4d21126f21
-
Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
Filesize
21KB
MD57d75a9eb3b38b5dd04b8a7ce4f1b87cc
SHA168f598c84936c9720c5ffd6685294f5c94000dff
SHA2566c24799e77b963b00401713a1dbd9cba3a00249b9363e2c194d01b13b8cdb3d7
SHA512cf0488c34a1af36b1bb854dea2decfc8394f47831b1670cab3eed8291b61188484cc8ab0a726a524ecdd20b71d291bcccbc2ce999fd91662aca63d2d22ed0d9f
-
Filesize
75KB
MD5fef9b615e8fb88b946870addb4b6c3a7
SHA1e82ad7fb33bbd3363931ae6cca273c25ba36693f
SHA256242e94b905acb21b7e3f7052eebf3a9da6bbff46e26be2b70467d3ee9dba99d7
SHA512d4f404f45bf1e9cb796b52c0d7eb11dab2fc58cccefb3a3f688f66c65e22ff1f1e98fbaaf3ecde6114ea666d0e55d48427e73cd9c92f382821faf15321234c19
-
Filesize
33KB
MD5909324d9c20060e3e73a7b5ff1f19dd8
SHA1feea7790740db1e87419c8f5920859ea0234b76b
SHA256dfc749d2afefe484d9aa9f8f06d461ad104a0ca9b75b46abfaaddda64a5e9278
SHA512b64d2dce1f9a185fbb8a32adc1ff402d8045d379600bf3f9154bbde18303610f18af9fce258442db1e621ecf10b77aafe99cffedfcbe2a1490056c50cc42d0f9
-
Filesize
140KB
MD573940eaf3f9dd31a8b0bbf9274b3b5f9
SHA1d9237aa50d360018df9cc460babf79486825ea33
SHA2565cbd4006569de1177fe4eedab8eeffe64ced17b3ee9c50819a4ed011de7fd0fb
SHA512769d21ca70bbf2d87bf86d38a127f6b121e358df16b85bc1bad812c474d887045b91c3a3d9f2ab7b3d72ab11697365500583dfe3ac575967f5ddf96ca9c15654
-
Filesize
5KB
MD5955b89231df3c63643cb02087fbc7e67
SHA1834886c82164922960e47fb81bc88fe493193f67
SHA256dfe982284229470f6b6bd453673b2b3216a2f12aad9e8c6b9a866cdef2e13bcb
SHA5129d6d6e52ef558032f688a3a651ac693bdc443d12fddd08a87a4c5e61c743b9911e24d27b2bd60296a87a048a82633d5d054d49774299b2de7925238b90e1730c
-
Filesize
8KB
MD5bc4dcdfa067bb6715f7e0171e2f88962
SHA1f8349d055879fb5488726e07387eb913f22ce402
SHA256d73665f4b41f3ce945fd6f4de5b8d67045d705c2d30141e654fd7cab9265fbb1
SHA51234e081ea16d34caf0d9563e224fed1fc228cdd5ca571af59a63cd9c2f9af852ea0a723a5f2371abdd3d3f47e29bdc82b0d28a5f0f6b47846cd208b4419d4ec6c
-
Filesize
8KB
MD5f168d84dab5af5565e24c648420965b9
SHA11bb3ee779636dd0371dadc154061fe18e27295f9
SHA25661b3f7909dbf7aa8a920a16a8f1d129eb568b8e4e960473c7be15d4a71583eab
SHA512bab31b267394b8368c52ef68b91deb61ca3b47c03d46142b7bf0137e11b2eec6c90f0c9a311c01dd31955c9fe1bd7e806434d012ace2a9bb940d7a5dc3702dfa
-
Filesize
24KB
MD5c0499655f74785ff5fb5b5abf5b2f488
SHA1334f08bdb5d7564d1b11e543a2d431bd05b8bdd1
SHA2566aa332a4d21802b2dbcd08e153764da60f538ceb0daaaaf7504ba8f67c08ef03
SHA5125f0cec6dd823f2b3ac62017383dbbf71ed38893724312ec75e73fb197e0bcd5418bb70fdfe9150f5ca495d5f8547d8a08618bdacb5010514a3cb1101437d698e
-
Filesize
2KB
MD5cb6c259e0edc23657150043d423b50fc
SHA17e8b0f6570a9ffaa66c68e47baca70650e7f1dbd
SHA2562df7aea9ccdc16f2bf1962003fcb11cd9611ddf70e52633e77155a0f63934715
SHA512373fd4521cf471453182f28c90c2f6b512329e225e39c2b4690e153a46dcbe9298af793ba5676ba59d23b0242faeca408dfdb40a7af9a92a70f503d213f1744e
-
Filesize
2KB
MD52ad60eb3de115d4ebb5710bbc375c979
SHA1e2638af188ce404e12b18d25b07dc752efbae6f5
SHA256794334c0f5654a616444b929850c90bcc400e1dda249625cb173f68c09385cb9
SHA5120493d25f4dcd8dac81ceee2e0292028041dc94e646938967f3b804d7dd528247b8209e1a8d61f51ef70f2974eb545f1751c33e8d5fb403c5f37598fb8f0f8c9b
-
Filesize
2KB
MD5fd727fadeea4c6fdf9b108f7e4460ef8
SHA1110593184ff5d4bb0d34c23d5e271be90ab80440
SHA25614c1dcbe7336462d4fb93d5949076bf9294181075327438629f6780182e58027
SHA512dddb5251078cf9587e59a379be73a90bca214f506ef82a1bd555afe6b92855b01e8e1820a06f1a7548f2cfa9436597ad3d0b921a72afcdc45dc707d81b94e448
-
Filesize
1KB
MD5f9e836a5a64da074efb04db96eabde52
SHA1a007fecfd21ad648ddeca42d9bded4af23442b05
SHA256b036698822c89adacbbf840d4bd79d4e2fc5a0cd472d19f02169f0e8c77c06c8
SHA512e6a81c8d64185223301f98e8dce79d020fa4171701680eadcc1d045deea6ed4346fdef1d2d1c60c76c221d6ae55db543e52a23e779b720d7104249a53ea23177
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD5360836238576651ee284fd548f2464e2
SHA179166b2d8a82e5f8f9f3932e2aaeea2642fe416e
SHA256d883029a22d55553c46dd032ce24f51222a00894a4ae31c1e136c1f3be03bf15
SHA5122b34527165b1469a40a608dee03eaeba0ab49c40fd26196a1ed6da2dcdc6b1a66a16760375bbac616c017936b27862550441f11decc65aa0b65e7a8a163a5c13
-
Filesize
2KB
MD502fc19ea5f5eabfa52b1def4350693fd
SHA1648db98e6dbc3f704b1c0c9fad2a4993d5f180aa
SHA2566a30f86bcb97d2dd1acabb77e4b1a13831d23c4ce629ec7c85c33515f1b2b95c
SHA512e68b5de3e3a6b086732b88c88e2a7515f0b57c19d63fbb21d8901e0c1353c32f2c3e573771e31c60861955bf3dac7d7a3cbbe557e8b3f95a2cd3a663fb3552b6
-
Filesize
2KB
MD5eaa565223d96b0e1f6c9bcff6276c8e1
SHA1e0a010398189fb57274f19ff51de94a778ad2a70
SHA256478ad083ac7b0110c08e71496737cb1d1a31b3738ecefc209cb54e1f227c661a
SHA512574ca2a76c4a2ac0659d2fe0487aaae5ef923f7878256735e2dbc37bc167a61d76ccb35767d8f437628d2781493fee44c8467f61cc90b6fa55bcef45a8598b0b
-
Filesize
10KB
MD5939be65af33ca4ff334e45cf7be5da8a
SHA11b0d1cb11db74b2c3560976d5102d765ce643882
SHA256e29f1aebc9f3d2de437958dae68d85ba2641df835a1d07907566634f60a3e728
SHA512a74a070a2f17cff70de0390e13ea68586db02b465816a77021e178d3514ce4a964561ff1330687a1787534d46af2af8891bc0cce22ee1e9ed0cc74875712c105
-
Filesize
2KB
MD55a1d94f189802962fbbce87cf4a0d580
SHA1bceda79645b722eef072edd8ded619e2a23d3f37
SHA256cf4f483ad1f28881c610c9d96ffdf8bfd1863743a55c9c8775bdef77ef117f48
SHA512fab3f1d0bb7c0c0cec0bf34fc499d35e18ff2395a55638578409011d336c92b0bb65204ed9713d6ed6b180475bb2ba63a861c5597bca1539748b8ba3bda883dd
-
Filesize
1.1MB
MD57340acb870497624606bf1474112656e
SHA162231ef800ae6389c39031ebc0b0e9ea91f21826
SHA2568111a62f4478b427a8382c4aafcd40bd8c026f20f8608c325dd6375cfdebf8ba
SHA51264ba586870dff4f49d0e4efdb98fbea5aea66144cda1a719fe6273a5414e58ad05f56853951d261c896c141bc12b70f90ec907e35b075c07700ccec250fa996f
-
Filesize
898KB
MD5f9239bff804de58d783ced29e950acef
SHA152694b4031dbba3ac71bfaf286d50ed0cc11639d
SHA256ccf9f1d65154dc131d548dff3240e0e7295d58452817774e5a063c5b13e83f0d
SHA5122627264995228e802f9d4911e63a572625e8f3f4bb5cf2287e4bdc94307678eef8a0e36df0566ed90f7a07991680b768a67bce7754232f2d2b77324e83c200e5
-
Filesize
789KB
MD5fb96202a314550a0d8b394b6e0b1e1e1
SHA10e99ece4d747569398e3417a4b3c9cf2a302a189
SHA256a17063947cc6f156393f52354d2ac86b7e46aa1c956991fe20110ba2db6ed075
SHA512df46309b8e9291f08d32a2f803021becf0e5363b43f2e679b2b27ef6b6fe27bf6fa49c386bfefd70bfc7fdeba62898e69245d176052926f72ace82f02b2d5d2f
-
Filesize
1.6MB
MD5f38e0c615464e215d3e34db75a372ab8
SHA1c4f1b5f8e8da90d3d1ae7167223561419afa5282
SHA2566c4f0d032a98fddfd9e05c24698f7a665f872254db58ccaab9bd69b2de9cda97
SHA51254dc45c5301db4b314739d89ab6a677f081ef2948020424dcabb7e6e4395ad10588c503f416c572fb51330e223d71eec32b6fe203dc5fd489fb4f160603a3217
-
Filesize
37KB
MD5996237863d95233cfd111dd78289932a
SHA16747ceb940678e230977dbc099ba77f3c42261ee
SHA2564f88c75a87294206a034625faefc4330b00a7d179f34dc7f67c053277b8d2f35
SHA5125946dbc5672f673e138285bcd716815a80f46ad4ea7e6ae3553094761831754108eb0e8f8ab29d3d5409564c81b426afa5c88647a64396bbc15a539ca842dee6
-
Filesize
1.3MB
MD5acbd41c2deb6192e7f3d5b4c4d44aefb
SHA1ee408ab0f5605da7b8b20c85e83ad116f5ff1a1d
SHA2563f92a3ee9380e83888c52ecafe7b5fc4f46e2a522ac3cf9b9a83f0c362215c42
SHA512e99a4456b89b2795fd47293182def9637b36e6f5b66e8019f0cf0b169552cf137d211f817c8f78883877387adbc591938f43803c72240533d04474f8fa5533ca
-
Filesize
3KB
MD50bc75ac4e2d94590776355dd295a107f
SHA19bb3b06dbcd2c24f76e76a655228e83fec4809c0
SHA256cf94ec5adc82385cfa5d20e8dac9dbff0d95962edd227c855b3633d397ae41cc
SHA51285ee13834775767c1d222112528bc3f7a96aca106112f18d317509b9885a31750acb3adc033f75cde8938902c2b9dfcdc962f5120138a14a51d373da42b71c5e
-
Filesize
512KB
MD58e7743d807112cd3b9e0e5aedaea9085
SHA1f4a641c5fcf31677a7a14aa469bf2898b28aaa14
SHA25628a6ac13a45e96a06a88d5dcd5ab66bec44a1a0ee87e3b9828cfd87ad8b37631
SHA512952d645be27206ae50339ecb105613bc026d07503336b4adcbb716a6308f459552e92fa48b7e2ad0bb69141c6e8420028357a1393af5038bfa73858eec79715d
-
Filesize
276KB
MD5391cf2a6765b782fb8246c284d6aa80f
SHA13a2558d9f97ca3e5f76c45dad3fcd1e7c8e215b1
SHA2561264a45fadf544990c69219329c5192e00138101fed5a75dc0ac541e65491ee7
SHA5120e4ad117bd69b9092506fffd8bd1b327f1cb2e081e886fede39b02f3d08878201dafd6720bd1ae3cffc9a825c3a2c53c92ad6c686744b34f68af546201cc1951
-
Filesize
64KB
MD5578c8ca07a0040736c723f755332cff4
SHA1bbe1448e51cfc66c6dc3dbdbf91a8910eec4fce6
SHA256319b350cbcbfaac2d306ff8d9c60816ce823e2eb450d0a254b53a453ce223fb5
SHA51228147a47499d0306e723cb596418e25408e62991284f6f26c6bcbe64b117fcf3b8caac3da30c42f53890fcf1567119ec9dc9764238b30a46a0423850596aae83