Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 23:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vkvd70.mycdn.me/?expires=1715298277342&srcIp=80.249.150.134&pr=40&srcAg=CHROME&ms=45.136.22.160&type=3&sig=ee4pa9KDDGI&ct=0&urls=185.226.52.170&clientType=13&appId=512000384397&id=832159025716&dl=1
Resource
win10v2004-20240419-en
General
-
Target
https://vkvd70.mycdn.me/?expires=1715298277342&srcIp=80.249.150.134&pr=40&srcAg=CHROME&ms=45.136.22.160&type=3&sig=ee4pa9KDDGI&ct=0&urls=185.226.52.170&clientType=13&appId=512000384397&id=832159025716&dl=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2818691465-3043947619-2475182763-1000\{F9F5CE7E-DDF9-49DA-A35B-179CD5DD180D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3960 msedge.exe 3960 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3900 3960 msedge.exe 85 PID 3960 wrote to memory of 3900 3960 msedge.exe 85 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3892 3960 msedge.exe 86 PID 3960 wrote to memory of 3136 3960 msedge.exe 87 PID 3960 wrote to memory of 3136 3960 msedge.exe 87 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88 PID 3960 wrote to memory of 3608 3960 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://vkvd70.mycdn.me/?expires=1715298277342&srcIp=80.249.150.134&pr=40&srcAg=CHROME&ms=45.136.22.160&type=3&sig=ee4pa9KDDGI&ct=0&urls=185.226.52.170&clientType=13&appId=512000384397&id=832159025716&dl=11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea46346f8,0x7ffea4634708,0x7ffea46347182⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5908 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13673421803147058026,5538051456641056504,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f972ef359036dd4d0516ad3b12040f37
SHA18186acaae7d910e1f639da9ebf7cb16e0494368b
SHA2561ab5d1a9e966a4567ad02fbc8378921a96bbcd562fabee3e11ea0a0ecfa877d6
SHA512ec3ee250cfed45a8af9663e334ce57ddd26c603c4214885add27e0e5e18d44dec2bb92bd9f9b249d6689e77fde4cef9a843bc2cd5b14fb1096b8405bb7a533e9
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD56fcd81eace91e08090af152173d32800
SHA1173091592104f44d2a5bca7b4696e3a6458e6a1e
SHA256410bcdccf72dd5960fbdbea960ebb4ab8478d0d3b4d5838a7431cffb59fab343
SHA512ed054467ef454004c9258c050582f41c69b2840945df4a42d247429f705a9555636e5d8868fe58e604b9b92afa1cdbc033627acddd17ba937c51455cff2522e7
-
Filesize
9KB
MD51d50ef60e7ec32e96805c1b56e5e8094
SHA1d3b5b0f3fc433641538255cef227ad9f4e7856dd
SHA256ec8c43b5a02c76fdabdc24e68e7126f396fb60425d39f4e4de5917f10b005c92
SHA51215aa7156b8b340513337b069a2711707ce17175b43b1664855c97692987f1c105aea4e185dfdc9ae1714823bf383797f4a0bc878efa53cd2781024334c8c34a9
-
Filesize
5KB
MD5c25079b425555e82d839080fc0979cc1
SHA1e67d859d63b482565c961f23caa6c38fc2245832
SHA2565a2f5f66df4d8853862976407a16f46e6b30d97449ca80a1770d4b20899517e8
SHA512ac721a86223ff524bd97f9ce2f026bc7cc90f58f569234c7101d669861b0c09e498e0a88765e130088add531179651412cf031e9c2c1c71557b358fea009e8bd
-
Filesize
8KB
MD5a75ed74e29d264f35ddf596f50cecb3e
SHA1df4da55338034901069a7f508175728737930077
SHA256bd0c43628512143d271bbc7558a5030072c12ce921f6a67ccee2c7cbff2c7dd3
SHA512f1ca3056abb70bc45400f08c29159f07107692fec94ae1914870660402fc0c901f0135048fc1f3ddd1c450e9a068453b1a4a2729ae73a5ff6a4c93631af24c1b
-
Filesize
8KB
MD5c2fc955e59dba90d53f86f0030ec8226
SHA156935cf57e813ef9e8bb315315cd7325065c38ed
SHA2566c3a9bc15a5b81b7041d8a2802669159221039abdcbde129c6a4756b756a6a46
SHA5121d156538ebe0a11890c6fb4bf50bfaf84ee1d14e7b4c543ea11ad03e0d3d1e331d5abd45e0cb9488148ea4766e3510b79ae14a3a5661125f489a617b7d9fae57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e4b65470f6527467e2df8fbec5e0309
SHA145d6157f29a703b9a690d34497df4c3c39b5d3de
SHA256ff28ddb0adc45208665e4672d4f56b662e06497f1003d248131a67a4d0fce89b
SHA5126f279836fb0f9f424895adca2f51012b64c3f3cf63056ab62220367044ca922b5e9e60d9801802e7c9163f5f29b428174dc10b915f3a8195e72792ad7793836c