Analysis
-
max time kernel
193s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:23
Static task
static1
Behavioral task
behavioral1
Sample
019a5eb0f583eb75462947dfd26b1c1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
019a5eb0f583eb75462947dfd26b1c1a.exe
Resource
win10v2004-20231215-en
General
-
Target
019a5eb0f583eb75462947dfd26b1c1a.exe
-
Size
719KB
-
MD5
019a5eb0f583eb75462947dfd26b1c1a
-
SHA1
8b094cffce04486f19aabf093b632337742894ee
-
SHA256
38e78e82f70c405ddc0dfcf00e4722e39674b9072c780f2e091e065a130c993f
-
SHA512
c005cfae731f7b22204be10db310015554f95a5da38cdd172685cb12eae58f8aad121df72c7a8593ca996b3298aeff1a6ebdfd11f1c1cbfa6a60dc3a0f3f4e6d
-
SSDEEP
12288:mczJJhqrVPlcwT73y23hP8qJ+Tq9MFG4Zv5V8xsMIg7OAiC9BHjGlnOzwiiSigjm:mczJKVdcwTry23hoT7VksmOtaJCJ8w5T
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 019a5eb0f583eb75462947dfd26b1c1a.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 qqncdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings 019a5eb0f583eb75462947dfd26b1c1a.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 4088 msedge.exe 4088 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2360 qqncdf.exe 2360 qqncdf.exe 2360 qqncdf.exe 2360 qqncdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 2360 4092 019a5eb0f583eb75462947dfd26b1c1a.exe 92 PID 4092 wrote to memory of 2360 4092 019a5eb0f583eb75462947dfd26b1c1a.exe 92 PID 4092 wrote to memory of 2360 4092 019a5eb0f583eb75462947dfd26b1c1a.exe 92 PID 4092 wrote to memory of 564 4092 019a5eb0f583eb75462947dfd26b1c1a.exe 93 PID 4092 wrote to memory of 564 4092 019a5eb0f583eb75462947dfd26b1c1a.exe 93 PID 4092 wrote to memory of 564 4092 019a5eb0f583eb75462947dfd26b1c1a.exe 93 PID 564 wrote to memory of 3600 564 WScript.exe 94 PID 564 wrote to memory of 3600 564 WScript.exe 94 PID 3600 wrote to memory of 3160 3600 msedge.exe 95 PID 3600 wrote to memory of 3160 3600 msedge.exe 95 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4788 3600 msedge.exe 98 PID 3600 wrote to memory of 4088 3600 msedge.exe 96 PID 3600 wrote to memory of 4088 3600 msedge.exe 96 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97 PID 3600 wrote to memory of 3384 3600 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\019a5eb0f583eb75462947dfd26b1c1a.exe"C:\Users\Admin\AppData\Local\Temp\019a5eb0f583eb75462947dfd26b1c1a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\temp\qqncdf.exe"C:\Windows\temp\qqncdf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\temp\tc.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.97dn.com/?tc3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc08d546f8,0x7ffc08d54708,0x7ffc08d547184⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:84⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:24⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:14⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:14⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:14⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:14⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:84⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:14⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:14⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:14⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:14⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:14⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:14⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:14⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7754370824730429880,8099000395715692410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.97wg.com/?tc3⤵PID:1340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc08d546f8,0x7ffc08d54708,0x7ffc08d547184⤵PID:4552
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.wgxzb.net/?tc3⤵PID:3096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc08d546f8,0x7ffc08d54708,0x7ffc08d547184⤵PID:5024
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fa070c9c9ab8d902ee4f3342d217275f
SHA1ac69818312a7eba53586295c5b04eefeb5c73903
SHA256245b396ed1accfae337f770d3757c932bc30a8fc8dd133b5cefe82242760c2c7
SHA512df92ca6d405d603ef5f07dbf9516d9e11e1fdc13610bb59e6d4712e55dd661f756c8515fc2c359c1db6b8b126e7f5a15886e643d93c012ef34a11041e02cc0dc
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
341B
MD59a77e3349becf08481e6571e00dbb4d6
SHA1f00d8ec577c98d7fac144aab734a3aaf7373b41e
SHA25650c1866e588d22ee438a0387697675348be99a6f856e9a86f2bd364a93f51f9f
SHA5121068837dbeacf0306e823bbaf0dc3825acece036e4cad6168b5a75b0f9086f6c330c806aab035af866932cdbf1278e461be687e3125747cf7c701e3caa6209ad
-
Filesize
5KB
MD5032ce8660c1ed7439c8b6794fb21a0ad
SHA1ec6366f58174cd5909e9766ef4940b85c147df5e
SHA256076cdaad2c3cfbf3ed651448cd78a409b86b15a4977d5efacaa86d767a99dd5a
SHA51296fb40906703dc8c645f09df86613da2820eab5711f3987887e37b6f641a4905fc843551fd8a0851acc3345652ba2c07a4616c0cfd45a35622c11390cff431e3
-
Filesize
5KB
MD589c134fd2b3452aa5423ffd4d8e89d76
SHA15d08cdd80a97961140b424805ced8b3cb4ccb14c
SHA2569f51bae29c3ffcf886e7143748bbc26140300f5950815f19688979c5ef91f3b8
SHA512b1782494a065fa0a9b97d9dc3230141a579e00258dcb46f4a190cca40958ef68c7bf945e06169a235a7e6c804756096d2f61e76e01ed60da6363fc00e4981d4c
-
Filesize
5KB
MD51652ffbad38769f610b54a1186434133
SHA17dc5407e47e757eb02c229fc02b78c1a97068aaa
SHA256c69393f410323bd7ec22c778254c522dc77af958a8a83c3bbf3e815076bb934a
SHA512d8fee596ff6e35d4c45a662bf921d0de9c3d44a6b91db40c1daf6424d7d1e10c90ec8a43ddd22a51e8280fcc07bb482a85ea30cfe3261380b500aa61585787e7
-
Filesize
6KB
MD52297f26212c4436060ffb285b9be1692
SHA13df3203661d15c91fae4371b66a823da1c8a6c18
SHA2562e57b4a635b18fea476aeae6ea9dcb22bc14e14a1304291c8cbea847d423dcfd
SHA512e8091b7c4500b3867e663ee705e317b03bbad5aad4ecc1fb99b29341f0f0c622aa7eabfabfa0cca0dadefb74a1faa71899b6bbd1c9251b78f3345d70f72a64a6
-
Filesize
24KB
MD5917dedf44ae3675e549e7b7ffc2c8ccd
SHA1b7604eb16f0366e698943afbcf0c070d197271c0
SHA2569692162e8a88be0977395cc0704fe882b9a39b78bdfc9d579a8c961e15347a37
SHA5129628f7857eb88f8dceac00ffdcba2ed822fb9ebdada95e54224a0afc50bccd3e3d20c5abadbd20f61eba51dbf71c5c745b29309122d88b5cc6752a1dfc3be053
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a3ef23e8d5f66815e51f335234bb8cd6
SHA12319e7bf06f505de4729f2b71e074c7e6d4c1993
SHA2568a976aff51c3cfd7be1b69fb80543bc71d1314084d3d95e2a0020ee30b3bd574
SHA512e8b59858e058466894b83405c5a8c1ac0869491cfe64f84af539b9374d5daf5fdc7dd90333828fdf63f379f1db077f706134f2f4cf5f2bf7202a918fba353d25
-
Filesize
10KB
MD5dfc7aabdd8c84aedaac296bb46c097b5
SHA1204bb7b3be42113960f42d16378b40e9662715c7
SHA256130414ade1148485a7a6339ccc5c4c03db9206961e6d71602be7ed5077a50531
SHA5122c19371ae2533c9195536a5e732bc64ad0a1de610fa739cc2feb3022e74f2bf0a2ad3e022e453c5faea8669e1683e71ce9d87383b0219b66f626cb41e2bd57d4
-
Filesize
1.4MB
MD5acf4c987822833b4cb4ec7e924e05c64
SHA109c1dcb3381e60eef7a6987b5c1e3ae4c6efc613
SHA2566342d28485cec75a5f42f12644087ea092cd0e3ce5a353fd639ef49437a4694f
SHA51293bce4c1747ba81c6f9fbe435662c4ed628b2dae035f19115b49e632fbf8c770ba875a275aaadbb24fe5c5cd253f8f18c1d46882f3c9ba981cb3b1dcbf5032da
-
Filesize
532B
MD5e7cee80668c49e36509f063fbd2a0456
SHA1eb8d8ac6a72669e460eaa89389234a1f57e08a64
SHA25613c4272d79239c3cc374f8bc236b4b2fc0d4fb476bd8000dcf4bca8e0fe2a373
SHA512eae6e2cde9456075cc9d4167e8eb698e4c27ef24fe05282f022af86ead070c1e9fcbd841a5e75076e1cc9a26e8f5508396b05838673f2a79d52c686f824d80a5