Analysis
-
max time kernel
1048s -
max time network
968s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 06:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cdn.lkgwbfh.com/o841l7912ilv0mpy30hq8768vqu/768kpy7b.go
Resource
win10v2004-20240508-en
General
-
Target
http://cdn.lkgwbfh.com/o841l7912ilv0mpy30hq8768vqu/768kpy7b.go
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 82 camo.githubusercontent.com 83 camo.githubusercontent.com 84 camo.githubusercontent.com 85 camo.githubusercontent.com 86 camo.githubusercontent.com 87 camo.githubusercontent.com 88 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{E9066BA4-292B-4391-8E20-F180A17C4754} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 1224 msedge.exe 1224 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4708 1224 msedge.exe 82 PID 1224 wrote to memory of 4708 1224 msedge.exe 82 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 932 1224 msedge.exe 83 PID 1224 wrote to memory of 4940 1224 msedge.exe 84 PID 1224 wrote to memory of 4940 1224 msedge.exe 84 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85 PID 1224 wrote to memory of 744 1224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cdn.lkgwbfh.com/o841l7912ilv0mpy30hq8768vqu/768kpy7b.go1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2620 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1300 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2704 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,18180162719574564328,12037718927389823852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5da955c990d8718b698662aedd084cf0a
SHA11bd70531b2103ae850f8c308a17389db7e3a16f8
SHA25639d2a1e8cf8d81f602203706df0625670ecb6ba72e71225e7b4c55e7771821d7
SHA512fcb99d30d157a949e2fad9db4e9d3955c253182a19a3b4c76c45614bdbafa908d015956746b5360f93b6ada00957324fd52f5789636f2b411a50445f64de86a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f4743b1e09af1290f7e98f18b88d1763
SHA1130cb7a09e29221211489c89c6d1e8000aea034b
SHA256676da11b9a0faf1019095550b084ff64b6eff22bea53110d9c27960fb882903b
SHA5124be67369ec5e44c3f20a016fee08bc6f74df7368a9a8e8676dd7f2794a5b9d6188c35f44c9aa2a2928b558e0006913a5779490bf8147bc3eaa976af812102483
-
Filesize
493B
MD557b08f42e0c34f62bab072acaf568b15
SHA133feecafc60a54caf42428ddfbf5f06926e5f586
SHA2562e1fefbe644a58c38bf2cdbe5cd4cda7e53ed282948cd6ad7c187d5b65dcb49e
SHA51232a3e610de817434a73669ab3c875fa0bdb016114ff9085093335f835dba88ac60ebe1fb832eeadc190961251399329d189571eaaf018a1850c36ac2f3ce05d4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5c4387a812a73841140f7334d31bd4011
SHA1a42d91359385c1a1d64ece9c1ffa236a0fcf83eb
SHA2561d8b0c72d59d4cc1050162008e249095441350809d1550f715e3fe8e586be966
SHA5126e33049d1b3936e42dfc9b42b2b4dcf4b1c658b035608ca3670aeb3b6580aae75578e5c240ed5954e60964095c2740b53d903252a52aed831b3d25ed4de3f5ff
-
Filesize
1016B
MD5d7b5b3a298fc9b1923605533ba79f477
SHA1942b2abf0b8363a56b6a0d3a1643db40d9a3d5a9
SHA256fd27b80ecf2a5f1231bc5a1a0db4ab770b36be7207e758f511fb7b5226619893
SHA512325b51e0864f5934f91930a9c059d2d1666c31e0463c82c3b819fa2e2209910f262006d428e60e6195d0e4387b848972fc359a33c401e99814942bea7528578b
-
Filesize
5KB
MD55d6b23e476f7cf1fb4b24181bb90a56b
SHA18fad085020b3510601f3f4186ddaab71dc11e88e
SHA256c19f202a16f9cbc4fc50e438743b7beade5d88541425260b26d1badbdd5a2f95
SHA51267402a2ce0d2ac1778dfaa8f1bae2ce6c55ca451280dd855be3cb5d6ecccdd1fed5d19461f4d8062210ffd94928ebaf46d97c4ec3244780b197ff26a6f7586ff
-
Filesize
6KB
MD569a89a3a80a333c4940b80e48b94319c
SHA152de1bde7e8c7fa08c654489bac54625167c153f
SHA256bea364495a38b967af132e365cd8275a7f22725695fa9f6669aafef370fcc590
SHA512bce2ca0cc4c3ecd643c30a5f83a15eb9aae7ad2e22ed2a3eaf024f2faa1e4c9c00b355aaceab7f5a8c8306624da8fadfd52301969f2d3adb585271c9dd898896
-
Filesize
7KB
MD59af31da8f1c58118d6a5caf9802b17db
SHA114e3aca5a88bab2e9fa25be2ce619ec30722c7f1
SHA256a8df8fa89492da8a998876c99778200c87b1dea36f4d3364092193cd030bcd36
SHA512187b39219f4bc83175f40de36291a18776bde7289bab3962a8bd2a9a3b8f10ec7df9e3dd7c7182fa99a7178d53b48f6658cccf1ca3febd0917921187e956b04d
-
Filesize
6KB
MD5a98109edcc09a3ad2a2d5469dde872b9
SHA1b621939e127fc71426e5f6ad02e7b6b1acffb0eb
SHA256343fe373ae90fd9343d657917e87991fc751f9a7ac783c8bf4a74681d866909f
SHA512a2b4eadbbe062676dc8722958f0769cbfdf3033472eff4f5f9ca0e5d2215eb9c0cc86a88a917a73a28fae0b7b39b5988fe17263e1b80aa7748ff1a22918125cd
-
Filesize
7KB
MD5c59b78a38ce4c3b5b5a01adc818d1f61
SHA1cb147cde7366ff86a7e1752736c8b5209f8743c1
SHA256b0cd33eff9b22529e8a809b0ba4df6bd4f9307c568d1a91dad8feaac2505ca08
SHA512b646905cda8260776d439f4567fcdffe87a1b67c8f437fca1d6d1e2bcb35df70d3bf680a8232e9b363edb30674420bd98557db169cc22e510636ff4b3e18ef1c
-
Filesize
1KB
MD5fa92587f255b7c2dfc34ef7336c22ae0
SHA18dbe5a580ef621d9e9a21491b2f5df7d4dd1db81
SHA25643d3c1976bd7da7834ec440d770219dbc22eae5741f8938ea5b4e62860085aa7
SHA512247311ee2236d861da64dade4cc342184cae6c6940221e4533005e7ed9e7ef9a39f404c8c6956199636baeaf59849b8723e4a12e4ba8b31ce275095fcaac8714
-
Filesize
1KB
MD59bb0a473eeda066cfddf321219f48717
SHA141323e70932b7abaee68d542d54943592d08d231
SHA256ee1f212bc6dc65798c977e191b3954f188ef026eacb4021394ce225e377cc295
SHA51250b5df72b5d55476cfb41babcc14cf4f1a4c1cbbd9c796f832c2a3a4e6e8d7746e91f1751aaa8e7666b22a9d2929568cee175fb6f3f5f306059a356cd8117057
-
Filesize
1KB
MD598dbdcf100b066d683cbd11b7f4cc594
SHA1943569a63b0c6bc1fdd9569cf49a4e9a357aea9a
SHA256f76754913a5d4377838f733a16cae3a04136d8b37d2808944e58875db2f0be13
SHA512860fb15a471c36c1ce8035617efdc58f89ab0981a5680ae5c157cebfe2144b1118ea70998d680c4c0dc17d6545b054c7005638cabc79a98962025e84bb5a570a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53f9049db8a816bc30564cc55a1c4cf25
SHA175b61a310b9d9efdcad5b1bdecdcbfb45dc74741
SHA256e31defa620f133c37961a3c07d7afe4424f0488f51187bdd6611e55b10d642f9
SHA51233983bde7cd91ccc9a9d7b64219845bc21ecd127e0fb3432970a99b837fe16c84d28fe8325b6f3a6a006892d31970520acc647fcba00b796884687e456850083