Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe
Resource
win11-20240221-en
General
-
Target
0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe
-
Size
896KB
-
MD5
2961823fa4ccbdaaa70bb1ed6fe1a91e
-
SHA1
17eec795ee52b84c08fc6bcd59bb82100836061d
-
SHA256
0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46
-
SHA512
95342ed1ee370a440bfc8626488c58aea5b46ff650205402a347993eae5cdc7b4250d85b031f184940d815d126af2033132f6ff5f2c637d58cba42b5fd5da149
-
SSDEEP
12288:CqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga6TR:CqDEvCTbMWu7rQYlBQcBiT6rprG8aKR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 4764 msedge.exe 4764 msedge.exe 3772 msedge.exe 3772 msedge.exe 2904 msedge.exe 2904 msedge.exe 5276 identity_helper.exe 5276 identity_helper.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1836 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 87 PID 5088 wrote to memory of 1836 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 87 PID 1836 wrote to memory of 1684 1836 msedge.exe 89 PID 1836 wrote to memory of 1684 1836 msedge.exe 89 PID 5088 wrote to memory of 3772 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 90 PID 5088 wrote to memory of 3772 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 90 PID 3772 wrote to memory of 220 3772 msedge.exe 91 PID 3772 wrote to memory of 220 3772 msedge.exe 91 PID 5088 wrote to memory of 2704 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 92 PID 5088 wrote to memory of 2704 5088 0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe 92 PID 2704 wrote to memory of 2336 2704 msedge.exe 93 PID 2704 wrote to memory of 2336 2704 msedge.exe 93 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 2304 3772 msedge.exe 94 PID 3772 wrote to memory of 5024 3772 msedge.exe 95 PID 3772 wrote to memory of 5024 3772 msedge.exe 95 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96 PID 1836 wrote to memory of 2404 1836 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe"C:\Users\Admin\AppData\Local\Temp\0e8b3eaff169013beaa01916c07c8f3047140e8c5611ce392b782a4c841d3b46.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbafa46f8,0x7fffbafa4708,0x7fffbafa47183⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,11897085477005200646,14392183118418556786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1460 /prefetch:23⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,11897085477005200646,14392183118418556786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffbafa46f8,0x7fffbafa4708,0x7fffbafa47183⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:23⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:83⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:13⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:13⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:13⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:13⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:83⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:13⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:13⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:13⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:13⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16635350838212605546,7172530385421079022,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3316 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5704
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbafa46f8,0x7fffbafa4708,0x7fffbafa47183⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1532,5979022801686314765,1802065399565549863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50bd5c93de6441cd85df33f5858ead08c
SHA1c9e9a6c225ae958d5725537fac596b4d89ccb621
SHA2566e881c02306f0b1f4d926f77b32c57d4ba98db35a573562a017ae9e357fcb2d2
SHA51219073981f96ba488d87665cfa7ffc126b1b577865f36a53233f15d2773eabe5200a2a64874a3b180913ef95efdece3954169bdcb4232ee793670b100109f6ae2
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD555605588c710ebc118c2ee3c22f7bed3
SHA1f4237c7f27dec3da2b8bad7cfb36b6a7eef468e4
SHA2565eaa02f9bc68a7b9f9fb3abf0b38ff08b23fe23abedf6f77ddf53e29ea4c41cf
SHA5125725ae06a83163aae3e89d6cc62a1e1a4444b9fa23f1d71588b7e1e53df84c68f9ec0962be5364c022320e12f89b1d4bd8040e95f574f7376ce8faa8ea8e4ea0
-
Filesize
2KB
MD5ce30b5d41610ce08da49af15237f9c7c
SHA1fbf94c56087c612f69c43c95b885e8fa710a8c2f
SHA256e8559d46379fad9e79f4bf217866c04db818a1f7368eb589e114e6cc074ce611
SHA512a9f7b79443a352ef08a77cc993d5536447fcb20e74919ecdab03162a82406726e4ce67859c02c83196e2411df40aee4b2bcf74892f9a09d97ba9e984ae479c55
-
Filesize
2KB
MD50aac471de7bddf7a22a27f3bb39299f4
SHA12d5abb969d005768fa1283e9d83621f82ca5ddd4
SHA256b28a54bec96f0f42ac3602e5b165246784f3efe368dc5e21e2400ae21738278e
SHA512f743e88236cbff181f816656b17d9e026c31f7462d9ffa0e8c7ad4c7129834becaf4fc1824d3080d605e811af4d1cd9160d7fb5007ce42b5399ced6c7ede56a8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD523dfdf8fed136c1b64b0667f1ab0bc93
SHA1a5dfa545bde738100bcf7a580c6cc95993524ad1
SHA256e88ec5efe5cd4b5d551ec29ea92237bf3101c39f194c4524f57162030d51c33e
SHA512cccd0437507e4edb65f8861c0432d94bca2174089a116cdea51bbcd6a2a31df48646991e98173e9afd358a26862b63025ff9d74eade9f96a3d13ec4ec61f7bf8
-
Filesize
6KB
MD52ba6738bec0eba3d4c114d4c94d41122
SHA1d53619a9bc8a8a3329c28fe253e16e4880db2542
SHA256ea0b61d62638c5887bcc57e08d419bb55a2004c2a71011032d6ada187d928218
SHA5120c794d799b65d0131e986f4c8f9ae5a498db6e616ca1f38e224ca504ab23a5d28c00a47b6ad04d42f4ea874731b0b7a8f993cf5600e35fdb886075a39607b4cc
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
707B
MD5af662a6bc45077946d3ef6e6c8c4a157
SHA16296af919778d6ffdc447bfc32fea02809bc2484
SHA2567deff719fc5cda4889dcf69abba98e1ed29c239f50029376ed677bb06e04abad
SHA5122806795e37a3bcb866cc02c41901699c8ca0486498662535262353923c693566129169f8e2b94bbdb9488b2212bf60e078ef41f91794a8b8a63868d526761e6a
-
Filesize
707B
MD5c5c3d4ffc1cd0f56964e00794fcccae7
SHA1e9525702bc4deb7d7fa324f30a6e654ccfd0799d
SHA25657fa1b190d7a7c3e50838618dde9a655e5c562d680b3bf94adb3e552d3806b86
SHA512454af1e41219b6ec945f5bf30b8b26a7a8bdecb621a2b9f9f94c74902cdcf25ec6810560a2dba69cbbd8ca13b303bde730db30cd2f5e0a21b9c3289de1e0ac01
-
Filesize
707B
MD5834153f9ad84ea866dd5843f34238505
SHA12628d9cada3e1f9c0811961f2f2847645c6d002d
SHA2568162aba8ef1d866a83672d7835ad6e47342407556571859eefff2f7be21d7186
SHA512ff7308dfe68ee692787a4aff5888188d9dd573d6500ad719ee1cb927be32b7d59b7fc0265af4304e3f8cf99d1094aead407676d94b548a9cbb151c17be2c2746
-
Filesize
707B
MD5741609f27dc9d8bcfd61b8d7ddead725
SHA14e59291193e7becf35889ceeb02ebaf00da94b62
SHA256399d6734c29ff3aa2d971765e024754a1102a267f0b23112a9457cd7ba4db28d
SHA512c8e4bb02f254ccd086db2fe6b75bc343b83a58340c402933c8896db74fc18f832577261ef93a3988a0721f2d2a8b6c4af8d4c287cefaea93da5e6e3c7e461e7a
-
Filesize
707B
MD5fbdadd616cba7572b9ad350a77e47abd
SHA14679ea53fb18940443cb7e361ddf137ed23e3db1
SHA256935e15d89ebb4358ed3ce80b1e4374c7c3055ef2a4690fcae220b7655189e08c
SHA5122b09bedf25a9e61c97af4bdd49e21ec6402076a99789364db6e0ba45f6d2af05a5e2c5dbccbd215d7da86dbc3478f3f6754344924cf1835b09f83fb149e792c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD5ee341cf3585a6c7357b3514f76198f31
SHA11c54700a94ee50f44b86444c1b2c100701568888
SHA256b4fb8fb6795ae884a51d3d282953d4aa76ab1e3c46ec4403450f5c544568f251
SHA512d606ea74ff32fbae0365ef8741ce2ff55c4583b4e0239488aa01f24d314dbf08469cd5a8aa4a08ad4acffa071778c6a38824dc00a43bce7a467c6d955aac10db
-
Filesize
2KB
MD5479b562b58dbe933cdd6127983be3b16
SHA15fa6a9b26aa3df3998fe89db34a17b9702d0759a
SHA256587c42cea6d68590b7c78175f9090f9ce3a299bde119be192fd504d47c85219f
SHA512adef5946b93a502af6c67019d6ecfb96aa5530b7da5b01d22fccd1725d98dd92c36e2465274443509038b4cf6ffa1f39749b0246d7163f8aaf52e47a74b85604
-
Filesize
10KB
MD5940a6b9f44b7969f67bda19433484c9a
SHA148d7217af2bd0a030c8cd674d08d5e43a69b4ecf
SHA2561df189be9108f495a99298e081010f492ee0d8ccc72a5b8beb8d893535879bdf
SHA5122161b5d1e6a69b0b13769ceea8bee2b709d6c027b9aca5ea0c9683d7dbc3095896022189d70307c243e6f0dc97d350008e1eaf26d45d93bca87b9d99dddc7675