Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 02:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sentryhub.cloud/downloads/
Resource
win10v2004-20240426-en
General
-
Target
https://sentryhub.cloud/downloads/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 2108 msedge.exe 2108 msedge.exe 4224 identity_helper.exe 4224 identity_helper.exe 5776 msedge.exe 5776 msedge.exe 4904 msedge.exe 4904 msedge.exe 5368 msedge.exe 5368 msedge.exe 4600 msedge.exe 4600 msedge.exe 2016 msedge.exe 2016 msedge.exe 320 msedge.exe 320 msedge.exe 1476 msedge.exe 1476 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3720 2108 msedge.exe 83 PID 2108 wrote to memory of 3720 2108 msedge.exe 83 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 1136 2108 msedge.exe 84 PID 2108 wrote to memory of 4404 2108 msedge.exe 85 PID 2108 wrote to memory of 4404 2108 msedge.exe 85 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86 PID 2108 wrote to memory of 2348 2108 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sentryhub.cloud/downloads/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92b3a46f8,0x7ff92b3a4708,0x7ff92b3a47182⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3524 /prefetch:82⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6212 /prefetch:82⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9227824668077157032,4565658791331541524,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x42c 0x2f81⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bd6dcf456dc570b0ad7899b9ce07f9cf
SHA1f8ab17290b925cc182a7a5dfcb5c83fce5472c94
SHA25613a9760681d3be8a307cd80f2014bf4e55074a125b5799cc47b85f42654b2091
SHA51210957699d82247ae54a605a01c5021f6a882d058f2c59660e170b95a3e244a37ab16411cfecb2c7d7d123b3ecdc642d2353c58dc702e78b38284b2eb2c7e84ab
-
Filesize
858B
MD541ead985505bb2adac4f5788414ea9b7
SHA1b2b69b5c99ae5a8057318f39052188b314ef5f37
SHA2560f5fb9bd8b8ab339d835dfa9f08a81fa83a73bce75a2c21701de1cb9de8179bc
SHA512b489160a9256b1f4f12727b43ee6141b0a35cb2be4a0b88d4fc21331cc7c38c232ad0a947177d22d6fe7e81023dc4b795a298729ca5d241e369e98e9cf94551c
-
Filesize
5KB
MD55de3c8483be95f7a6f9d1404a288908d
SHA143249b6758c75d6476e6a20a09362d981361536b
SHA256726b307eccdcf48dbade389943d737d7fde3630ee27f06e76ba145ac05dd2107
SHA512f82f1f57c4e00f1fed4b4d3645d93435d3af2c4e022a622d73760c90b0cf1ea11cb930f31ebb676e9aa5989f8e70b4e0383408387653c9da7f8c0f0bcb6e9d0e
-
Filesize
6KB
MD571aa306860c9e1a72f1a6dfccf67799c
SHA169633cd7a008fa6e4ba4cd99e1a7ed033e624e83
SHA2565c3a5c0ddfdea0722f3880e539f3d629c20d92cf5c973f5346cc9ffb6b5e2232
SHA512a76aba8d0faab5d5e30d1324f0c9572a43cdba1acbf056c23ce2f490f72ac3a8a2bb13091537bbd112b5d7a175483f93e146c73876815400d3eeeee65a3fe416
-
Filesize
6KB
MD5a08499689b77e2a04eb8d6c7a8eaff83
SHA126d20ff83591869de42d8706d1f3d2f1d7a64f3a
SHA2564febdc057be812f07a94848dea0ca4d1b27d8c59c7e08afc5c83eaa5b6ebe642
SHA512c77b763333ef0dc83c58234cf20e16f775e20bedbef0405da3440c64f3b278e3a5a4ec50016db7e1e793ac634dba808439c07dc4a28087b5347f2ac3f83ef9d6
-
Filesize
6KB
MD59485c2edc4c20e9314fdc9cd3291e8f9
SHA15f2b9cff8cbfaeaaeeaafa7456f82ca79ff636d5
SHA25616ab2dacc598afe6244af8d5b08f9b4d4217d139aff3e8cf2bd5b05210f8e9f2
SHA512ed15bc7468bfcae4afb3106d7a468fdc4039a4ba4ddaa429e981845a043c00676bbdfb619ebaa52b7e5e81f51539512e8daeae53933921d5a93ee5293c3640ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f9f79f0a5d752a07734dfa47be43365
SHA14ab6ecee75ddc84ae235f9e230efa91210660fa9
SHA25668b70f1edb4e4222111e607816301ca1c57aa99cf7c7fff6e71b4054736b4969
SHA512fd6a930b19270990874050ff21c6d17cca5ed870707f2345036b4d139f6db30529fe08964273a85403af8ff57423756cf6b27fb726c52ecfbc03d6077a305479
-
Filesize
15.4MB
MD5f2c4af070b935a1522b92d790ddee93c
SHA1f9bf33356a0f91b091d9f61e688af44b800f57a6
SHA2564a643c8ac145763b7e4a9b410a5dcc3562faf0f2204ec0d2613833923628f419
SHA512369f8c27db42569f6185499f792d7d01013cc1e48652f568dfde6cfdc3c6d4d40f390a1b62dda5adbaace33e3f9509a062bc0e08863f4704084fe7d33ea7778f