Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe
Resource
win11-20240412-en
General
-
Target
1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe
-
Size
896KB
-
MD5
e6f4ce3cb8f7ffe6fa052584282c4444
-
SHA1
204cf5a388b7d25b28142815b6f01d108417bbb9
-
SHA256
1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04
-
SHA512
5d6a3e1d5eb596cc9faa1294e9189fe2fbca0583840e9dbbbc30f54fd29754f90aa42703228b0300e7e74c0312da048e898c18cc9b4975a0c7482e8fb96b3ad6
-
SSDEEP
12288:IqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaXT8:IqDEvCTbMWu7rQYlBQcBiT6rprG8aD8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 1656 msedge.exe 1656 msedge.exe 4832 msedge.exe 4832 msedge.exe 776 msedge.exe 776 msedge.exe 5292 identity_helper.exe 5292 identity_helper.exe 5772 msedge.exe 5772 msedge.exe 5772 msedge.exe 5772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4356 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 86 PID 3136 wrote to memory of 4356 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 86 PID 4356 wrote to memory of 3868 4356 msedge.exe 88 PID 4356 wrote to memory of 3868 4356 msedge.exe 88 PID 3136 wrote to memory of 4832 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 89 PID 3136 wrote to memory of 4832 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 89 PID 4832 wrote to memory of 5064 4832 msedge.exe 90 PID 4832 wrote to memory of 5064 4832 msedge.exe 90 PID 3136 wrote to memory of 3812 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 91 PID 3136 wrote to memory of 3812 3136 1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe 91 PID 3812 wrote to memory of 3252 3812 msedge.exe 92 PID 3812 wrote to memory of 3252 3812 msedge.exe 92 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 628 4832 msedge.exe 93 PID 4832 wrote to memory of 4552 4832 msedge.exe 94 PID 4832 wrote to memory of 4552 4832 msedge.exe 94 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96 PID 4356 wrote to memory of 1152 4356 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe"C:\Users\Admin\AppData\Local\Temp\1309edb6187258fa9ce2a4e5ce538f6234e26303768f0854712e2518c5b05d04.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa054746f8,0x7ffa05474708,0x7ffa054747183⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,7387743758032702725,2527176354938393458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:23⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,7387743758032702725,2527176354938393458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa054746f8,0x7ffa05474708,0x7ffa054747183⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:23⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:83⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:13⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:13⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:13⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:83⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:13⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:13⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:13⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:13⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8757553284827422574,17637438696959154555,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1044 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5772
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa054746f8,0x7ffa05474708,0x7ffa054747183⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1500,2886803442173655330,5128544257348446510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5a10565a9d4d22076eb77dc174ec64e5c
SHA16f667dca98b145e4b03ea890ea913f02fcaade73
SHA2565e5c65e81152babd064915a3674dabf487e8320466e3b889ba9661b4806abf23
SHA5125778db414b5b6b278accb2c2a3976c7e554ee030831ef63d4220ae318bec7e73890552bb2d1b168b29e19a4d0c00c1f97fee7531547bbe7c936b675308bffc98
-
Filesize
2KB
MD56669d1ddefd87cffcff2d6afcadd45e6
SHA1f505d86b08de35ad9aff6f31b24b2094015ec21d
SHA256df6e1c42b94c6c4e4209672fd64877c7f0dd32073a640de34c20bafd5d717c7e
SHA512378b7749d962315b2c8b37ef4b0da61e2b83d56c4c4fb3fcc53c0a1780e332dbe73931079f9102d027865b20d708a68c5e4fa8180762d2bf3a836ec2afe00e62
-
Filesize
2KB
MD5eafc775ca3bab8b68ea9eb005a59a0d3
SHA1599a3645cf358018f5d4950a23525c37bc7224f0
SHA2569dbcddf8e9629a4d24c737abdb85534334ad6c9db869e395e7044a986e5c5573
SHA51203f3524d1c5c704803dc320ff881df0ede71f7280bbe55816308c70245cea9143d33c1b7aed7d5bad6f8789228b7d147e6ac00e2cf6c859cccf2f27eaee07a8b
-
Filesize
7KB
MD540a43841c61428929f1eddff2a44bbad
SHA1a19b408cefe8b06f98c8168fd6b7f175901f862f
SHA2567c7bf1581b9308ed281d154f3adb5809b680903e5b4276af7ea2d95406d01245
SHA5124372d6fc99610936d7e7c115f81a37b45b3edd7df6ffe06c6b7b0c06c5a914c3f8e25a86ab2dd73a35ce2f69430dfadf71409408c844e1f678ec2a966a104edd
-
Filesize
6KB
MD57535b82b3d84f1b3c0d5d06d650ece19
SHA19e039546eae284774cd30467a7c64838cb6f3abf
SHA256e72faa53bbbeb777061fbd99f22109171e04b86db82320a1ab8765ced881f7b8
SHA51207bec2ddb6214054240d07c3dc3be29bef894968c73cdac4633e5d3e3237573fc4b35a46926882a9a72290fb6d0c852df3af14b324f846404cc3baaab6cc1eb7
-
Filesize
707B
MD59cccb0cccd260a15f0d77fb2f4a67504
SHA1b9265d8082abeea5b1abed09023f678bf13a9f42
SHA25626f024a97fb961258e8f617e96306a6d04879b2b25934f396c18fb8e7f79522c
SHA512d59e7008ebe32b21388666d5b40731579c15b4d9aa358039cfc8d3647c87196c48772ac6907942d25c9e0c52d4acf3148d43b2ac742e0687583c4343f2c2c302
-
Filesize
707B
MD50c6ae0e116f77568ac2f924b45d53e1b
SHA1438da05e1bdf9d518ba2b37dbee0c2047851e082
SHA256b70fcf970996bb4bad707a190231f568cda7677dcdcc877769d59180a872e294
SHA51245ae37159cc5bae03626af5390ff85ca27480dbff7e93b2b521fa72d92f15e2050ea17c4321ffec869cdf036001860780431c65a851af5bd2efd8c4842f2bf32
-
Filesize
707B
MD50b65174562108c36a66c8c5e42d87c33
SHA14bdc4232f84b0483127c58c98a471abdec49b3ee
SHA256078cd3352ae756f780ccb739c4988b6181842cf484a74493050957069beb3288
SHA512a74c39c2ef6144fd405a36cf4ad544568a191cd3a1da3dad64914cb04ee788c76a7323cd3c0067b942743a299f92beee5fe10912c5e9e79884a005dab56aeb74
-
Filesize
707B
MD52eab09d8dbc7c6114ae7f5ceadc427b5
SHA1a4f6b909505c02d58fa474311b041c270eafe671
SHA25609e1be124c4bf6e29d17f903a522f4e14d41845317c3d618d9105e9958625484
SHA512087c140007ea5bd510d037733cd34d6aea1e1b91fc38e45ce4500a88a8f3ad235c1360a80a59e3310cea095b2acf99d34bda064928a296cbdd200c6761ab077b
-
Filesize
707B
MD546bf8bf37bc7e2adda7bd32275486ac4
SHA10635275f34332b97375edefb6c0e70e5944e3b60
SHA25685eb547310d11331dd0fad09772a0d13e3f241ec41f439a5e2ab8e1abf41b2fe
SHA5121e6034fcafe68b50bdb3e5fcc539ea5457c51e34230ad91d42e30bed32d6a466c538711cbe32b726d48eaa931987204b840420b14720532c08ccd81a9d175a53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5af1ef64741644ba9a5081d5a98fad2fc
SHA1e81288f4562326fe6476cfb36134a929836db78f
SHA256cfa9bfb8c15e31306f1fa0cb75c4a8f8cd68bbfc9d916ed1eaf799f84800f251
SHA512732b186d90387f7993458359d8e8cc878554add5e8f27693b52f72452a5e81f98b318cdf83408db90f2bd77582deae430753fb6ce4005fd0798433ec1cec34b9
-
Filesize
8KB
MD541c9408e5ec0fb4382a5f786edd02adc
SHA1ffd408060c6c40414d59d6610127c779fe805227
SHA2565128227389d56628dfb1401cf0944260fb9ffb3895d94206999e87aaef90b67d
SHA512e987c257d28fa99b60071f96adddcd95db78a37accf7eaf26169ce0b35696324620df870930b5418785df0197b6e83ab3c91d64aa84f4837a5db26cf39e89dec
-
Filesize
11KB
MD5f99793bed97ac0fd066d831facd4681a
SHA1844eef60dc8c605b7b09b2dfb43d9a977a399637
SHA256f64c691ba5edd168f3a5f275c7f92c24e9499f7e920fa2bb8849666566b4962b
SHA512659b85d6d1bb59dc65897d5df4b5b883c331147531a4293bcf9acaf4ad46eec99854cb2b6af4b016eaf1165a6346772c31f8db1cdb7c2007f160b0708fee052b