Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 04:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://appinstallchecker.com/og.php?u=/cl/i/r7rmgl
Resource
win10v2004-20240226-en
General
-
Target
https://appinstallchecker.com/og.php?u=/cl/i/r7rmgl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-399997616-3400990511-967324271-1000\{ED01F092-E859-4103-8A3A-1901E49E10C0} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 5052 msedge.exe 5052 msedge.exe 5000 identity_helper.exe 5000 identity_helper.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3708 5052 msedge.exe 88 PID 5052 wrote to memory of 3708 5052 msedge.exe 88 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4632 5052 msedge.exe 89 PID 5052 wrote to memory of 4976 5052 msedge.exe 90 PID 5052 wrote to memory of 4976 5052 msedge.exe 90 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91 PID 5052 wrote to memory of 4016 5052 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://appinstallchecker.com/og.php?u=/cl/i/r7rmgl1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd385346f8,0x7ffd38534708,0x7ffd385347182⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2884 /prefetch:12⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15251751774012941454,3124842388030232110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:5636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
69KB
MD5a127a49f49671771565e01d883a5e4fa
SHA109ec098e238b34c09406628c6bee1b81472fc003
SHA2563f208f049ffaf4a7ed808bf0ff759ce7986c177f476b380d0076fd1f5482fca6
SHA51261b54222e54e7ab8743a2d6ca3c36768a7b2cf22d5689a3309dee9974b1f804533720ea9de2d3beab44853d565a94f1bc0e60b9382997abcf03945219f98d734
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.1MB
MD5764666e3debd6fe7ff0c0b625a41a62c
SHA1d89070fa6d0ce0f1d23a734d7dd59df17857e002
SHA256eb96750ea92f4a0869b8bc96e6da246127aac54b53a336c924c7a7bec891258a
SHA512ca32adb6382b05f136afdc5328729ec2af14afab7a55fe777e06499ad2dd11550a09d278432fea9d9ec831ecf5d4952f08a8c1abbf299f2db9f226dab1bdf1c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD52c6af0353aa7dace5ae2022136dba512
SHA10933acab12e6b5a29dca2c67048edd6a7cbc698b
SHA2566cb637ae06fed612ce3b77f0fa721eec2e5b6437976bdcf3253fb21a35563d7b
SHA5127580e36643151911712b11c1d04efeb94c0f8b41195c43f7593aca951ce549d231c72600207c1a965b892895496ee22ae57660a762e119fab3b11e4f29342284
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD52a12ea0cf10aeda4985ac6b046e784ff
SHA19882b1eb17bc8be7c8c7eedb5e053b1859baa10d
SHA2568a61026281b3d22369319a487f830a91bff5ded03d3e9475f8b9cf7ede22f545
SHA512863c3de93b8fc8e1657e3be03a30658ab9ec33b7ae8345a95060ffaf6c0a98a42d3968786c78a79425f761b02a154b776f257d4644049687c4752fba8f888798
-
Filesize
6KB
MD517656a0902c7de36a56cb93379e4a37b
SHA16cdb1e059060ea8bc1153bb100b474e503e85057
SHA256e96136d82172bb5ab44e5074e4c1483b0c4e3bd6586ab3c337d3e705abb013d8
SHA51236f4e7a5fda9c44e3e3496da88b5f839b74bc7409f2923c985cfa33ec8f7094b2aeec38a2e843d9dcb52bd3a26427a3ed5b216c762139883a2bbb7b06331934f
-
Filesize
7KB
MD531f2f1415d1c088b6215fc2faac0e5f3
SHA175c3724ca976727f753599aaed2ba252f424365c
SHA256c223a3da6bcb3e3bd9fa67d907ea06220376a786aabac897440a90c9788cde5a
SHA512af43894b53f22024e6e75e25b8a7f072722ee0ea7596920b6a4a5f42271a8749c5d2c6fe01a9ac1878f292efd082bac34e910a7a5b8b6b48d2d7778dbf8394bd
-
Filesize
6KB
MD5a7528a69c47a0c4a3922e74fdb77d950
SHA10643014c70ff228595ed35ac793a340945822060
SHA256acda69eb7f1de5806300f191d097aaef48acdff5d94e80aa4c11104eebee9499
SHA51273e115e5e37313d88900e98fdb2d91047a3f766bbdd49409472f3dfa0ca86e06a9c6511c7ffa6b40f34130af92cef0bfffe0fc7fda0d9edafc527df6108115c9
-
Filesize
7KB
MD5fa52b2f907268f855752131eb61d5ec4
SHA1ce6553b129e7ec0ccad26ed9cde9c0ea59acf3c8
SHA2567db83e125384df0b2966d631e66ddb5dad1685fdaf5c2a6a9d94501eb62aa5b1
SHA512754fedd393cf461f8a430596d3c6c50eae1103199f4439d52f9cbad1b2e067454013a94622be3c5ddb30c9d55c5bf1fbef95264d2b80f688a89d1884402f5c1a
-
Filesize
706B
MD5f66250eeb4dc3832e0c741d1f5c8ea9d
SHA119d07ef5b88d32532c8bf1f3f6ada189908506f4
SHA2561191f18cd3c632740226615d96d641ece48d414cf7d0a6f98ba4eba78ac1a00a
SHA512a6275116afdbbd1a6f9582f6e35b1d12be905f5bf17ffff0c89471da5a492614a86f4245ffd8163c5621e627800b99966fa89d22d746e883442c1e3f0f314a2d
-
Filesize
874B
MD5e687c5368206ff8c1b95bf8d0df6de80
SHA16b13004f0a089a95e90ae22d9b796450e04a5fe3
SHA256142227d13edd38e2ee74d5e4989d424d294c4d8a1f7ce0a230cfad5e65813ab5
SHA512ab45c8acde5100c3e7cbd86da3f97ce5ace4fc7b275a24bc4ed31a4256b3007882a09f7a860e61d92a472026c15cb2d2d0690f1d2ef6b25e71cc3efd2e58ff10
-
Filesize
372B
MD5ab125b6c66e591343c042293aa793783
SHA1da09f9d20b5fdbae4e7648eed082c45ba364b05a
SHA2561757f53c5a9ea235b228b709f7fbac40ab278a917f962ed489193ce0a9f847ae
SHA512e8031d2fdab5acb407e98b6f08cb9ce55f0d6012f2829b3cc572ba415a5be8aee70800ba96b15419613fb0d7a3b055bca766a28d5b8788b24cfbfa0ba0dd9f04
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5908ef4be08e71f69aee69f6786e40f2d
SHA1259655ee77c8d15175542abc394b4062329c65ca
SHA2564a94208d51038072f76e6e5a30d930841517bad4894855e78a1d5b9054896494
SHA512a5d5a3661abb115ec005a91c39aeaaf7ff5c9480dda2bbe238b997fc8ed2afbda50440810d41447415d0b5ac9555af8e7d5b1911536bb96bcac11bc76f6f4494
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD537b6354a18a637146fc4cd71f85aa34e
SHA1560cdc7864776bb409c5ec6319f9af8ae11ac073
SHA2563f5a713f4147a450393fa10a540dc68ce644a9234b968c2f4161c4232a6eacb6
SHA512082891612d28c1d23c97950a4e6673f9875c297c314a3e2c84a0c9ecab18757996917e1bbd0bc19bfd87ee0b35210f0a9f5c57962fe31d3783c3ec63ed48e160
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD5ca176381ccdcfe0ca1c2653d46ec423b
SHA17afbec2ef0560476b20aa09fe8ba6e23683edc0d
SHA256aa5749bf226afa92b37d2019f65a4b55af579a1d66d6996058579ab854752665
SHA512cf85b8d712298c500b4f453352730df244ce931c7857664321671120b0814ba104b7e05417a51af975dd8af78421f0f0f87064bab16f634d304a8f766cf9e9d5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD531c128ed2c99881db4ca1114469874f8
SHA130f1de5cb8e4a498a5fb7f67e670c267a3ef01cf
SHA256382ec28b3864909d7cce05f7af9ab6ee88e427dfddf2da29d0e503f6bbd1ba63
SHA512333c1c3008bbc696e84cd99ce037c8100bbcd7147573be09c0307399b1578ba71457fe6493a170cbe8ce621a4d3b58a3be8109001acc9e984d4f2f3fd2d2fa22