Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe
Resource
win11-20240426-en
General
-
Target
da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe
-
Size
894KB
-
MD5
f16fbd1ca76a783a1333c3b5096dc613
-
SHA1
b6a98b9ea4f427a645e6503350327347786636ee
-
SHA256
da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3
-
SHA512
4a4362723ce740bd76230acb88f83755c63fa7ff5a872f9744285d4edd54902466e8dffb676d6640e946f2fec7740b1ed42ec35c8e661c53e1a4ce8e6397a8d3
-
SSDEEP
12288:+qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4Tt:+qDEvCTbMWu7rQYlBQcBiT6rprG8aAt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 2472 msedge.exe 2472 msedge.exe 3740 msedge.exe 3740 msedge.exe 4520 msedge.exe 4520 msedge.exe 5164 identity_helper.exe 5164 identity_helper.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2248 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 83 PID 1952 wrote to memory of 2248 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 83 PID 2248 wrote to memory of 1980 2248 msedge.exe 85 PID 2248 wrote to memory of 1980 2248 msedge.exe 85 PID 1952 wrote to memory of 3740 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 86 PID 1952 wrote to memory of 3740 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 86 PID 3740 wrote to memory of 4240 3740 msedge.exe 87 PID 3740 wrote to memory of 4240 3740 msedge.exe 87 PID 1952 wrote to memory of 2756 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 88 PID 1952 wrote to memory of 2756 1952 da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe 88 PID 2756 wrote to memory of 4312 2756 msedge.exe 89 PID 2756 wrote to memory of 4312 2756 msedge.exe 89 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 1268 3740 msedge.exe 90 PID 3740 wrote to memory of 3100 3740 msedge.exe 91 PID 3740 wrote to memory of 3100 3740 msedge.exe 91 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92 PID 3740 wrote to memory of 1100 3740 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe"C:\Users\Admin\AppData\Local\Temp\da4630dfea79b6b7003ecca4174f484649be79c501665df88d4cfb95310034d3.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe3ed46f8,0x7fffe3ed4708,0x7fffe3ed47183⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9548294420793768145,17705802453383722410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9548294420793768145,17705802453383722410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffe3ed46f8,0x7fffe3ed4708,0x7fffe3ed47183⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:13⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:13⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:13⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:13⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:13⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:13⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:83⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:13⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:13⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,629336627079353740,13727545738841710560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffe3ed46f8,0x7fffe3ed4708,0x7fffe3ed47183⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10442606513006353485,14929077112402213598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b72957ebc9bf2da8a95fa0aadf8b57ed
SHA19cd7872de8bb31f33adde6513baa07c6c1c92119
SHA256a0b943a7abde4fc83e3a4471db503d5992d488f77593d6252bd3c5e22c030d13
SHA512146781da144ac03d86dcfa02f3ec93334379f7725e75c83919aab8a5aa186a42b364ef3128e983999be9d03ab9815711284e353f5907082c0190424284ef561d
-
Filesize
2KB
MD566e6ff48c7d74d822e132c69994c8134
SHA1d534d8b6618b75b1f6c2dd1bb6dacb82205d29d9
SHA256f342fa69fcfb770ec2f306a36f4ff9e0cace8c0232a4db5011c6d64b4d633f43
SHA512f40dfc6c5d786ff7808f45831d86cb1bb2add9766e516638a394a26cd2717b38ea28d030d335ad2ab0f76b293757e1ca3789135d3ce22ded82c08f42191b32b6
-
Filesize
5KB
MD5a313ce446e1369ea67fda6ea0b28e775
SHA1d1957b2125cc78973d91c6cc3732c6030adb7713
SHA2565d3dc6f9b80c216d1b2c524c5b8e1394906b43e2b28833083d90ba802428619b
SHA512d31a5e6943787034b5c597fd42bd42d0be09a84800807f5b93723db305dc1e00a581900ea99ce3445a1deac1b6e23a18e4b52660ca8defbef06a488228d28249
-
Filesize
7KB
MD506858932ad35d98f20977ceb9f996b15
SHA19aaf8b3f8dc6eb010a53028fedbed276248d315f
SHA2560c959fec7893b7a7713135d0b6581f4323cbc05ffa30fe04ee14f94dcefd6476
SHA512beaa707ced4937673d0aee400a2014b88b87f336a17836e62e3891dbfb4d5a3d0154551241b7473243d27b38e6bee7d6f57bf608341f4b2008113fc3732ceae9
-
Filesize
705B
MD5921a6fa0f0b0af73d0e00d848e0bc2bd
SHA190173dc4b5d6e45f41a8aaafe411fd62d2b694d8
SHA256aa2373f98e9f230f8b4a1cc89b17647f95b6a55a374c752d5911ad911577c0c2
SHA512dc3fe5de13e8df89f253d67839e00eb47909ba74f4931da3f1c93df6505a9df13c1439c925d335a7fa10e06851b7252c243da9611ca7b70a6637a2474f0efc9a
-
Filesize
705B
MD5ed40e37b7b311ef33114ce1147c32a33
SHA1b7432bb69fef7e141a3e8f3ce8c3836f07c8fff0
SHA25633dbbfecbacc3aa5f9fc6f70742cca4f563970f78efd39de2e77f5a32839fe61
SHA5122cea8bc00c1b565b96d494507476a65e7b4a428ea913ca9a5ab8d993c0aa0dc288b84efc599ac2d9fc2330da7061a3a51b5ca863fd4f7e778b7b8ee265a89033
-
Filesize
705B
MD582ef81fc01a24d81935f883002c56174
SHA12d07b0d18eed285db205320cbf1675c81011ccb9
SHA2566f7c84cde991ffa35e2a166ad2a01df5de246ffe2d6b1be38beadef83323e6ca
SHA512651344471351b74e97c1d56477f55e2931d7da77da29d96fdbcf9bd020fa08917d04e27df1dead7ebbd41e1d0464a80427c29ea0c0c8f1cf8fd7d71d86dc9b15
-
Filesize
705B
MD5484dd620947c721f2ddddbaf0988dfa3
SHA1b612da1d5edc89a7ec5bdb72f8f8fe50e4db1b6b
SHA2569e55c711e6b29fa80ae7c6203c607e4873127494285984d5871426d0d404db5d
SHA5124c544bbdb1f1f07f87e45dd908d7377c3e379b42cbfbc2fab50309fb81cda59dc98be4e54425cdb487e4f8ce8899d0f935d0ee4b33f5c075ac1a46b61ff24723
-
Filesize
705B
MD5d585a79b7dd5473e479143e270b41612
SHA16a5777e7be71011f9637ae22849a91e8347dee7b
SHA256d1356664e20b23a62a3ae644a0d0ad1218e1034ab4f31efb26b77c11cf447754
SHA51208075c481c3573eed2bc3104dd3f6e2a41e6974cb4818992249112861aa1044e6461a57af4964490688d0613a0258d7e0d3ff583a2f3b95bcad5bdd6a26799cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c91295eb-252b-4425-9b3f-8ee96bc8ce6d.tmp
Filesize2KB
MD5b6eb9f6424d66f51c94ebcd604c5443a
SHA1293b2933fadcfc5131823490e5a79d1d1031383c
SHA256ddfd372386f3127b0d083ed59d0284b570df13a5c83729c49584d6bf22058639
SHA512dcfa3c3e89565df2b293036f6d45755075266869a5c22a54ccc99c468d43a0cfcb8c6c7ada9c07beaf79563d4905f297311b3fcc83b5f15629e8853e23938a02
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5cf469ebebd042c65ef62dbc6ed588616
SHA1904af6053288d629fab03d383881f6473ef594e2
SHA256ce5e37bfa92c901d962e3b5616eea00a243428e0b0bf4fd54f95516707ec4651
SHA51202218ae510b06cca99a7fba40469bf6816412ddfa39b8b01eb428e7c760eaddde35f06bb3c71e41e377854d62e49fdcfec635e47c1e088a744d20e4358446690
-
Filesize
8KB
MD52ec985183b454d8335200e559dc430ec
SHA11453543b4dfa2906ddc497188a1052b7e809de6e
SHA256a47c8daf400ed3033e9fc3c55e6304fec846fc57808263738908221baab78c14
SHA512ede09f89b758f5ef552cdd6295504287f21621e641df069eb8fb27ee316bbe4dec87e520d075d3ac090cdb3be50de27d9387726170330f3d1e66e5de51d518fa
-
Filesize
11KB
MD544ef16783ec32957aff83f1e34d5b48c
SHA1d3e2df2f5fb35bf01f813cc6cb077e87491f60d8
SHA2566514e127d5f938278f25a0c3a9457a4eaf042e7127431a07a982deff26abb57f
SHA512bdec4a45b5a729c5001519ce7c8fdbf0259a5c27a8ea5d2fba1240858e2df45f43c4424699ef72d64fb1d9828016b6d83f0cc13bcf9a1ece2631be0f51a3b1a0