Overview
overview
10Static
static
33f631a363d...63.exe
windows10-2004-x64
10498a26c182...6f.exe
windows10-2004-x64
104b34c552db...dd.exe
windows10-2004-x64
10532834d8ce...8e.exe
windows10-2004-x64
105896992807...ed.exe
windows10-2004-x64
1059c0083cd8...df.exe
windows10-2004-x64
106fc46cbdbb...5c.exe
windows7-x64
106fc46cbdbb...5c.exe
windows10-2004-x64
108433f5b093...73.exe
windows7-x64
108433f5b093...73.exe
windows10-2004-x64
1086d4877bad...f4.exe
windows10-2004-x64
109b49de72ab...8f.exe
windows10-2004-x64
10b05d662dcb...df.exe
windows10-2004-x64
10b84e93b222...f7.exe
windows10-2004-x64
10bee0ec9430...1b.exe
windows10-2004-x64
10c95a5553b1...1a.exe
windows10-2004-x64
10ca54f6dfd1...d5.exe
windows10-2004-x64
10cca7f7e048...56.exe
windows10-2004-x64
10cf9a62d5a1...b4.exe
windows10-2004-x64
10d211b73bae...c6.exe
windows10-2004-x64
10eb23946a76...29.exe
windows10-2004-x64
7f2301f9ee1...18.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
498a26c182a4f66822f65140c2f38df8b9da8ced42ed08651892aa416b8e3b6f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
532834d8ce7000d8e7eb38c91e27411e3b18295ef7db64dc83c3982ac0a9ae8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
5896992807f979d7483ac37e3ec58f2b7816d71d0c0cc96def5c78ddb0301ded.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
59c0083cd89906e6947197abc27233f2d2fdeb0cc852b57cd3a6e42063bc2adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6fc46cbdbb6e435050e052f67ee83426ac1f65c26e34bc81e339bbb10d07a55c.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
6fc46cbdbb6e435050e052f67ee83426ac1f65c26e34bc81e339bbb10d07a55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b05d662dcb605a8af070c2bd5fadda687e65adad15dca9ac32982db6ebd36bdf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bee0ec94302af9baabb3e2b4d22397424e0fa315031f65258b35135c92ff0b1b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c95a5553b1a709f22bba8f3f68e6c4c0eef94f99fcf143faebfb68ead35a0f1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
ca54f6dfd1d165cc099fcff983a1e0d5045ab7589a3cefbb07c34deaf08e0dd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
cca7f7e048cad1d80a1eeb878d27b78386889bd305ac5dd66bcf6ab8499b2256.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d211b73bae9760b12d1e027c009a4d8f4dbdb34ba630703d65ca56fc612e45c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
eb23946a76bf1590eafdacfb8f44604c986536b0b24a3b11f0aa7f8eb4722829.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f2301f9ee1f258528e83f30f1d7ea7bb59faa2f5d97139ddf14e0b5a805cd018.exe
Resource
win10v2004-20240426-en
General
-
Target
3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe
-
Size
758KB
-
MD5
5177f9d2842b74a2be7f5aba232faffd
-
SHA1
9b6c926c477183ff5682d2afe0cb62de976379c7
-
SHA256
3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63
-
SHA512
6fa2f49b55f799a8f82a8d520db344383f645c834291d731278a08e344309a9d7064ab6123e56d43a00fadbbd79694d85355b011a145aadc607137bc26befd15
-
SSDEEP
12288:YMrfy90krNR62zK5vnO9DfvHGmnqc3HJSo51S92qKytTWWzkyJyl:HyTNR61nO9DfvnV3prc9JNWoNJo
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/5692-146-0x00000000025C0000-0x00000000025DC000-memory.dmp net_reactor behavioral1/memory/5692-148-0x0000000005090000-0x00000000050AA000-memory.dmp net_reactor -
Executes dropped EXE 4 IoCs
pid Process 2552 gV7DZ85.exe 4616 1Fj83nk1.exe 5692 2YD6343.exe 6164 4xE421HP.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gV7DZ85.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023407-12.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4xE421HP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4xE421HP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4xE421HP.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2184 msedge.exe 2184 msedge.exe 1560 msedge.exe 1560 msedge.exe 5208 msedge.exe 5208 msedge.exe 5564 msedge.exe 5564 msedge.exe 5828 identity_helper.exe 5828 identity_helper.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 4616 1Fj83nk1.exe 4616 1Fj83nk1.exe 4616 1Fj83nk1.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 4616 1Fj83nk1.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 4616 1Fj83nk1.exe 4616 1Fj83nk1.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4616 1Fj83nk1.exe 4616 1Fj83nk1.exe 4616 1Fj83nk1.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 4616 1Fj83nk1.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 4616 1Fj83nk1.exe 4616 1Fj83nk1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2552 5028 3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe 82 PID 5028 wrote to memory of 2552 5028 3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe 82 PID 5028 wrote to memory of 2552 5028 3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe 82 PID 2552 wrote to memory of 4616 2552 gV7DZ85.exe 83 PID 2552 wrote to memory of 4616 2552 gV7DZ85.exe 83 PID 2552 wrote to memory of 4616 2552 gV7DZ85.exe 83 PID 4616 wrote to memory of 1560 4616 1Fj83nk1.exe 87 PID 4616 wrote to memory of 1560 4616 1Fj83nk1.exe 87 PID 4616 wrote to memory of 1284 4616 1Fj83nk1.exe 89 PID 4616 wrote to memory of 1284 4616 1Fj83nk1.exe 89 PID 1560 wrote to memory of 1388 1560 msedge.exe 90 PID 1560 wrote to memory of 1388 1560 msedge.exe 90 PID 1284 wrote to memory of 4820 1284 msedge.exe 91 PID 1284 wrote to memory of 4820 1284 msedge.exe 91 PID 4616 wrote to memory of 4584 4616 1Fj83nk1.exe 92 PID 4616 wrote to memory of 4584 4616 1Fj83nk1.exe 92 PID 4584 wrote to memory of 3280 4584 msedge.exe 93 PID 4584 wrote to memory of 3280 4584 msedge.exe 93 PID 4616 wrote to memory of 4696 4616 1Fj83nk1.exe 94 PID 4616 wrote to memory of 4696 4616 1Fj83nk1.exe 94 PID 4696 wrote to memory of 3104 4696 msedge.exe 95 PID 4696 wrote to memory of 3104 4696 msedge.exe 95 PID 4616 wrote to memory of 1172 4616 1Fj83nk1.exe 96 PID 4616 wrote to memory of 1172 4616 1Fj83nk1.exe 96 PID 1172 wrote to memory of 4956 1172 msedge.exe 97 PID 1172 wrote to memory of 4956 1172 msedge.exe 97 PID 4616 wrote to memory of 4008 4616 1Fj83nk1.exe 98 PID 4616 wrote to memory of 4008 4616 1Fj83nk1.exe 98 PID 4008 wrote to memory of 4396 4008 msedge.exe 99 PID 4008 wrote to memory of 4396 4008 msedge.exe 99 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1284 wrote to memory of 1984 1284 msedge.exe 101 PID 1560 wrote to memory of 4084 1560 msedge.exe 100 PID 1560 wrote to memory of 4084 1560 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe"C:\Users\Admin\AppData\Local\Temp\3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gV7DZ85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gV7DZ85.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Fj83nk1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Fj83nk1.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:25⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:85⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:15⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:15⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:15⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:15⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:15⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:15⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1976 /prefetch:15⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:15⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:15⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:15⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:15⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:15⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:15⤵PID:6408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6980 /prefetch:15⤵PID:6428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:15⤵PID:6588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:15⤵PID:6672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7276 /prefetch:15⤵PID:6812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:15⤵PID:6648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7964 /prefetch:15⤵PID:6660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:15⤵PID:6620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7996 /prefetch:85⤵PID:6436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7996 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:15⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:15⤵PID:7072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:15⤵PID:6736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7580 /prefetch:85⤵PID:6720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6604 /prefetch:15⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2697445567285840614,17684011531171147171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x150,0x16c,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,831135374845942797,12277819521368271665,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:25⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,831135374845942797,12277819521368271665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1383977905692981040,14131236593512543283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:35⤵PID:4540
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login4⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,17707071221658004118,14257389228948937776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5208
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login4⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1354301806186112503,2664051771366378482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform4⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x88,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:4396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login4⤵PID:3776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:2340
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin4⤵PID:5524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x148,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:5644
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/4⤵PID:6088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x124,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:2168
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:2828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947185⤵PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2YD6343.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2YD6343.exe3⤵
- Executes dropped EXE
PID:5692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4xE421HP.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4xE421HP.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:6164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD50cece93b11db7d167826898ca8fde45a
SHA119b545318cb017a575ad7c06f54bb4c4918e3093
SHA25634cfc1eb1a43965945d8c4cf0193a997fc6af86e7af971521b430483fa09ad87
SHA5127d181fc5d4d934af5f86d376009da97d697ec8fc78317db6e9234c8dfdf9480f8aef3d3c07fa6098035e345820e98c2a26a209083bc709c9fb08c72a657bc699
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5fffc47b32f94195408fdf302a1e730c8
SHA1be719eac12d52b4d7e20e0dcd5a06a9a0b56382a
SHA25631aadbc6c0017443ab9d9661f35e9b4611b76acb478e88d42d76c53788ce55ce
SHA51283f16aa695e696817c81f3841a0373b8fce17e1e08d3075ba7ff8b21cf1a8224d0a3aefabef0436ae5fd04ba320be82f553fe468d45541f282ce1a679c71e781
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_x.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD5c87b99f8c01063d54ca99cdd90c54c81
SHA16e80bdc7411619188adbaddac5e602c092f90f0b
SHA25684e0e6d85568636bb26c14f19df7dd42e20e1e35fdd59ed78b2df46922e05bde
SHA512f9743ade98864b406694cbcae6a4c9d309e6e5da6243fa148dfe13485466560b740c3495d5113d429ab5817ab3fc55c0276200fd0788b336f2bd111923e39583
-
Filesize
4KB
MD5d5023e8b8fcf88a4ba127ad82e923362
SHA17e41bc278e32c3a546ea157c78d5c3ec9f3025e4
SHA2569731f18bca745e4bde83425d19c8ae161ab3d8ea70ccca89689610718655e28f
SHA512975540ac14d1a68c134033f1a7c8af0cbf3d8346a75a4c7ee7466ad08bfad1f34ec9b63b3718c764a6134f992cc4ea81b133736a33bbddff8328613d65438ddd
-
Filesize
9KB
MD56f986fd3729ccc1fd6459023c10c8fe3
SHA1724b74ea8df1a4894e55658b333445c83ad13843
SHA2565032f7fd41a7074648d541ded4be2285e88a2da655b8714b0211281927a6df71
SHA5128400631ab08c04aece7246ca55eb595fd49d1d17976ba5c6146b899477e4b7ff5f0ffc78c83198ab71c7dfb4e98a0a88c5a19c6811f658994e97e21c158938b7
-
Filesize
9KB
MD51db90c770c66c3fdb76d8aef08eb8c2c
SHA1fb933854954bcc36afc28c4950d122102fc337b6
SHA256b075ff9aa3fce77ec0de2778f64c67f50a197dd6686ef4a70b969a22e2437121
SHA512627c095046235ea55e0453ebf388da5384bf4c282455427399b1895b531502e1ddee4911ae8d5179d52f4791bb999e06c920b0b754be961a360d9f61a03c97fb
-
Filesize
6KB
MD52d63d4ca7b94d6ef1f019af328c9bfab
SHA108841c94264f3166c28237a51536bd2e82ce8f17
SHA25615aecea0fd4c2c928a0286fb0d3630501c6dc9cc7b072a1da2e872def13f0d51
SHA512bf10f43504a7173d7f4d7e245b15dff0d266ed2cb31fd42a7c82ac518b6c5f7819cc4abe7104733fba5291df9fea3ef2ec25c3588d304cb325d75fe30f78395c
-
Filesize
10KB
MD50019aca99379a174dc16179d574b961a
SHA1d1e6986028e6dfa69b945731bc21c67b6502fd88
SHA256c62758ec8a30ed18d33bbbfb9677e66b5b31d11c9c1fe2ecf437eb35ca11e17b
SHA512fdd55be4f341966697b980a1895a8a2634bfec9e2a5c15d6ff46065b743eb9377d6c97ad5820a41fbb3a1807e82e624dcacbff316cbd101728e22a0632a4bab9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD59bf6c87272218b2fc7ffd935f8d7f79e
SHA133acdca399218881032d5584a0bb9d812dee4cb4
SHA25614e67c5ff4842a575d3420586bb65e2ddc6169a6be4297caec3e24772a75e251
SHA5128c38e3e3ad78ce69805d1e17ece1b656a9410eb55073de82725f2a88374dbe6a07dcf62f85cfe81bd6ad83ab279f44f59621ee885c5bd4d2fd2694440038cc9e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD585d90bf9b2da3c47ca9bee235181c0ba
SHA1a8f2534621f462adb736e1d529473fb994d66b31
SHA256168614c824e410e5cd8fa9ea48869cd5c149f4dee0ca393b9e95e5a0ef0b5e2d
SHA512f4cf784a540ea2610d4cf3643cf7b2137c11ee93b2686497aba2b0c2a7e41ba4744e82b2cc58ac957613b8c1c3c0449c911a2f87f60ba64a8997c486d988f594
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt.tmp
Filesize146B
MD5349873b73c19d31b0ed4fc44a97f3352
SHA19a9eb862fb140c6a7639dc3a5aaeebadc4352430
SHA2567d024b5b796a77c7cf852987db67d24b275491a08f04864c130856d8a925555e
SHA512ce8dd380bae9f7d8e2e3ca1d7d7f75a1958a2b7c8fc986c98673a330ec871a56d39fde077d2043175cc11b41617a9b871e23e51e981886af47ae8e5a883063f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59cf2c8149521644479d4019ef2da8baa
SHA170e025c066006895abffc98ad5a8e2d3c6ad1f90
SHA2560bfd7bdd7d78b8893f44c952ded1d84aa50d3871ce5a8f2ff42625d9f6d33bfc
SHA5128608b97e27715e1cfae698f39602c1fa5e32172cc5309caf2c9b3562e8dda42043996e54836ca595ccd4278e79f2ca306f0611abba1c54d89adc58d1b066541d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580395.TMP
Filesize48B
MD5478ccba5c272847dc4efc0ad460c5eec
SHA1bd4d406dc37816f16546f0bc51891ea3b0513328
SHA256ba5e5ad841c893fc9b47cbb43fe5932e03134f8df2c9fa449ffc9222d6483c50
SHA51297b3caf999eb1740f2e86b3d7b1c8331c1e77ef9613a9ad606c1e334d7f6999c8ad57d0ca5b15ee91392ca25d5e7ac198efd0060f9d8535b98920f5cc83e6c1a
-
Filesize
4KB
MD52dc0108709463ad1611e7a47c2a9216c
SHA1dad804023ef3e723904b07d18939466f22847f59
SHA2567d8495e616307ff73cfc684b9d60c17f3821e58c2e6a54679bd49b8a89245810
SHA512e5fd37167f96f09ee154402c9cf39a6363d4e8eaa3026de5b464dc9768e703d62ec418feebda6ee9865119228940b92300aa28f54d97c9742d05e578e6609f31
-
Filesize
4KB
MD559915fbd2dca8832f695a2e8fc0260ff
SHA1ead86508f01b1319978a7e3d2ad975d8e34d2f01
SHA256b2bba3fdf0ee5f5051aff1a158da6d81462d31ffab81770854bf82049a719d4d
SHA5126e31a726a9f77b3b5f29217594b9238171facad1e1c06bc2dad954164675283d6a705b83cc58be71ea58fb797a6b0d4e5531315975ebde15a455842fbe1de795
-
Filesize
4KB
MD54255c7e15deebcb2f40d848c408b893f
SHA1c317a368cae8a7c83e397ad491684fadcd2b87c4
SHA2560a66197010a97d341d3287823b7ec04cabfbaf055a92c6c21ff11a94da92c637
SHA512c5eeb6b727ad2a3e4ae3de4444de82d9f8a7c95194fbda1a133ecf88538e3a10a05da6d1ccf722cf9d8ce9e756de5d53a8d29aa04384c56fe17f1b9adb0adacc
-
Filesize
4KB
MD533a7dab5cc3ba015c979862f4ab20d7d
SHA1a13e41131bd43a3908e32e3dcfa3d5fb5060b731
SHA25605d29c6cf5bc96f62d906f69f85b4bbe5c909a30cde776c71883dfc92ef25d5e
SHA5120996e6b50bf9b35b1ccd6fa5a03d86b6749414a7c80f70142fc469925d20fb76d4bb7a4f3fe525d8054c0cf8b0e1d6c5293f2a5eadf08840841b5bddde24f9db
-
Filesize
2KB
MD56bd2ca17ece75bd8a599333a5b1720b6
SHA157bd9bd5a5750d56ede2ff4ec4e55cf7f0bed388
SHA256f95b3dc9c9a207547ddf4d67239cf7b921443a48e495a75dd45773a5b1874a45
SHA5124d26abe81c36381643dc641577d6fce046a1074e3c9e22514995bc342ef2585020efc6ec479d5c791976942f158f4904124ce325e3b1bf18f6b77936f70b0b09
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\baebb5b2-69d4-4c5f-8946-2aecd97394db.tmp
Filesize4KB
MD517a58c6e5f5c4e8d25c68995cb69019a
SHA105efd6d1b5bfa5e99dbf6b701cff09a43f758c14
SHA256bda50129afb979db5e7a40090e413d37f61bd22db24eed7800a22e7a045f8a3d
SHA5125d97ab530dcc750f0f30c065dfbffd780f295046f1e3280da9da9ba7bca2573c9792f06d52ff3a5a01dccff2ba3a0afccd3384f5e939359374f4514508089bb1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5383ffcba379466063dfac862ad05201c
SHA1cc7f000871ab4008ac1f4cf04f6d32d4b3df4b0b
SHA256fc1e9fff9721cd33d488fda8350483cf642c5c5e3c99aecad31bcf1e624a5793
SHA512bd2737174c17eeb4f86ed60bb5b732ca83178dc526b844d321c439b447adce26ce1f9a3a08f89bea3e7d9d59bd164d61b0b50111e71f69bbbf7d2363644463ed
-
Filesize
11KB
MD5ab9a2092272d048b0c798bc0c9a2e500
SHA1d9eb441087516a7980970d99b3462fdf599f73f8
SHA256a67da565727ebfbb114bfe022b3f8609606c4d32ea5cfaba00b302995ef58c64
SHA512080b33e609a784d9836fe793ed372bc49a600e534b270a9c687011b77062aea93a2ed2df9732237da46ae93b4f6dd49989bd81afd277bd48fafd963e00ee4494
-
Filesize
8KB
MD50c5caa3a653f44ca7307302f0e14eca5
SHA10a5b2e00a0b3f0b913c83b066057e25d51ba2277
SHA2561f9ee37db776a431f654464675e449490212a89f84560148ac33945230b71427
SHA51288766d1c8c5496e43f19d588a6b813f9f508ced00cbec5c4691d1e2720e90a05836813490700f85a889a954fbad96eef7aea3b70543ae4b0f3b9fd1b2193792c
-
Filesize
8KB
MD5db8e14bc6d0fb44f7d69becb4089a583
SHA1402438d52ac16d57e6a423849cb6702ac94eddf8
SHA256c3c95a0795b63e3c423a30028479e7dcdc5e822a08f3d72e4bc689a02c8edcc0
SHA512d8c8a3f1fa89111aabceec3b1dcf474b98ea3bb3d507f53cbe887541e702744783692416b3243b7e0dd677d8c72c8649f81df40b67816336caad20598dfe04e6
-
Filesize
8KB
MD568f447c702b0ed58d9beb0e8e911bb5a
SHA171efb9748e3c27023b54bd3f7e760d5e2aad9af1
SHA2568900eca9a7e2c989be098220659fb6b46e43a13aad36fba422e1510fbd2e0f13
SHA512106c32917922443bf6a5c1b1f145327ecc369e133db406e503a15cd46e1dcca53f0efb0082517344b8b8c48cc6c9a40b19d72fa5de4045aab696eb527e93b685
-
Filesize
38KB
MD53f8fbca34f369412254dba6a5e568d06
SHA1012a3b43dd88dd4240c838f66d24167ad495e2e8
SHA256a6e75460353f930fe37074adaa5e317940b28cdf40a87493101c3149cbbe2bc2
SHA5122a82371f69fbc3ad7e0ec6ad43dc47564ef42c0fc22da83bcd4127eb6bc5fe83c2f8d43df2ff6587da6ab66e1d858060fda8dd4b800d4fdafe70425b59bf5f6f
-
Filesize
634KB
MD53e05dfccb1b88983cfb2c652c6973ea1
SHA1eb7f4d4317f7d23b5f177c732da869d5c7bfb88d
SHA2562cb56a18d5a233d3a83f79902a05814b3ac113a0d05d00ec863ae45315166387
SHA5125df68fbf976d6218df6deb2eea273e947715726987e08cd66fcbb81741d4ae7581d2f1784883b7977e9a42ac18d06478cb62ca426b62445985e5fd384926bcac
-
Filesize
898KB
MD54e903722f062f52bcbbaea07fcb804c6
SHA1c81aff391e1910e733a14e2933a440581933064e
SHA256f09a3cecfeeae14f9165245c4ce951eb4eaaf4a7d061d8f6af7e8a561ad6edfa
SHA5122d9f9472e18221c2e9fbe7a6dddface65db74a07ef0819096ed905fcb0e652c760b840172099519519c84184442410dc71e9a872fb170fb805ee47ca3cb72bff
-
Filesize
182KB
MD57c843f9498585e492c94721ad7113b63
SHA103dd3da5b0fae5c0a037cb242d9f0c0e8c989354
SHA256a25674069b6df920ad68ce548f7678c8e4620717ee97a93554fb3d4e8293d307
SHA51270546c2ff3b17046beffda3e4b64e78b1efeed6dceb80c79d91354bad9dacc4b978a59c541878b3f4e656e6d804dcf2c1af6b36a1bec265471f2f9f0dd83e3c0