Overview
overview
10Static
static
309d331a688...e1.exe
windows10-2004-x64
100e5a6d1212...c7.exe
windows10-2004-x64
1018791f14fb...49.exe
windows10-2004-x64
10192d57a5a2...25.exe
windows10-2004-x64
71f41b39d2b...10.exe
windows10-2004-x64
102298c18576...bb.exe
windows10-2004-x64
102ec7b7ec25...b3.exe
windows10-2004-x64
102ff63e4636...cd.exe
windows10-2004-x64
103105fb3a2c...f2.exe
windows10-2004-x64
105233b9c00a...79.exe
windows10-2004-x64
1071ffbb500f...63.exe
windows10-2004-x64
1088b74d8884...16.exe
windows10-2004-x64
1093a899efb0...54.exe
windows10-2004-x64
1099144a8cae...06.exe
windows10-2004-x64
109c6fad81c8...19.exe
windows10-2004-x64
10b0c7a00ab4...9d.exe
windows10-2004-x64
10cbf1175688...f7.exe
windows10-2004-x64
10d722251ee6...28.exe
windows10-2004-x64
10daa8bcc1da...f2.exe
windows10-2004-x64
10e2046b06e3...39.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39.exe
Resource
win10v2004-20240508-en
General
-
Target
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe
-
Size
1.4MB
-
MD5
540279474adae3b36deb77ab62dbfd44
-
SHA1
fb2f936ecc76d7949c101fb665f5d0ea8d4c04ff
-
SHA256
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125
-
SHA512
45311689850dd286fdc30ff2bdca66d5bed753311974ce98150755ba6fe59a95806154abe685ef6ff2a45d87384e119df791cdbace9f6f56749f047bbab112ff
-
SSDEEP
24576:VyM5eKaQAhJoi25ceRIsZ7rGDEqDj2vVnZ3mdHC8a0rvlNmFcAkXqu4fLmd8o:w3m2y7SeKqPGzGvj3m1FNm+/XJm
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3896 De4ud76.exe 3016 VQ1kb66.exe 3096 rz2jr51.exe 1540 1lU06ob1.exe 6724 2nV4248.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" De4ud76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" VQ1kb66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" rz2jr51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/files/0x0008000000023484-27.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 3460 msedge.exe 3460 msedge.exe 180 msedge.exe 180 msedge.exe 4740 msedge.exe 4740 msedge.exe 5436 msedge.exe 5436 msedge.exe 6096 msedge.exe 6096 msedge.exe 8064 identity_helper.exe 8064 identity_helper.exe 8052 msedge.exe 8052 msedge.exe 8052 msedge.exe 8052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1540 1lU06ob1.exe 1540 1lU06ob1.exe 1540 1lU06ob1.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 1540 1lU06ob1.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 1540 1lU06ob1.exe 1540 1lU06ob1.exe 1540 1lU06ob1.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1540 1lU06ob1.exe 1540 1lU06ob1.exe 1540 1lU06ob1.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 1540 1lU06ob1.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 1540 1lU06ob1.exe 1540 1lU06ob1.exe 1540 1lU06ob1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3340 wrote to memory of 3896 3340 192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe 83 PID 3340 wrote to memory of 3896 3340 192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe 83 PID 3340 wrote to memory of 3896 3340 192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe 83 PID 3896 wrote to memory of 3016 3896 De4ud76.exe 84 PID 3896 wrote to memory of 3016 3896 De4ud76.exe 84 PID 3896 wrote to memory of 3016 3896 De4ud76.exe 84 PID 3016 wrote to memory of 3096 3016 VQ1kb66.exe 85 PID 3016 wrote to memory of 3096 3016 VQ1kb66.exe 85 PID 3016 wrote to memory of 3096 3016 VQ1kb66.exe 85 PID 3096 wrote to memory of 1540 3096 rz2jr51.exe 86 PID 3096 wrote to memory of 1540 3096 rz2jr51.exe 86 PID 3096 wrote to memory of 1540 3096 rz2jr51.exe 86 PID 1540 wrote to memory of 3460 1540 1lU06ob1.exe 88 PID 1540 wrote to memory of 3460 1540 1lU06ob1.exe 88 PID 1540 wrote to memory of 1148 1540 1lU06ob1.exe 90 PID 1540 wrote to memory of 1148 1540 1lU06ob1.exe 90 PID 1540 wrote to memory of 400 1540 1lU06ob1.exe 91 PID 1540 wrote to memory of 400 1540 1lU06ob1.exe 91 PID 3460 wrote to memory of 4836 3460 msedge.exe 92 PID 3460 wrote to memory of 4836 3460 msedge.exe 92 PID 1148 wrote to memory of 3124 1148 msedge.exe 93 PID 1148 wrote to memory of 3124 1148 msedge.exe 93 PID 400 wrote to memory of 2096 400 msedge.exe 94 PID 400 wrote to memory of 2096 400 msedge.exe 94 PID 1540 wrote to memory of 1836 1540 1lU06ob1.exe 95 PID 1540 wrote to memory of 1836 1540 1lU06ob1.exe 95 PID 1836 wrote to memory of 4296 1836 msedge.exe 96 PID 1836 wrote to memory of 4296 1836 msedge.exe 96 PID 1540 wrote to memory of 2292 1540 1lU06ob1.exe 97 PID 1540 wrote to memory of 2292 1540 1lU06ob1.exe 97 PID 2292 wrote to memory of 3212 2292 msedge.exe 98 PID 2292 wrote to memory of 3212 2292 msedge.exe 98 PID 1540 wrote to memory of 880 1540 1lU06ob1.exe 99 PID 1540 wrote to memory of 880 1540 1lU06ob1.exe 99 PID 880 wrote to memory of 412 880 msedge.exe 100 PID 880 wrote to memory of 412 880 msedge.exe 100 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101 PID 3460 wrote to memory of 5036 3460 msedge.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe"C:\Users\Admin\AppData\Local\Temp\192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\De4ud76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\De4ud76.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VQ1kb66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VQ1kb66.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rz2jr51.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rz2jr51.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lU06ob1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lU06ob1.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:27⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 /prefetch:87⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:17⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:17⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:17⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:17⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4340 /prefetch:17⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:17⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:17⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:17⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:17⤵PID:6180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:17⤵PID:6492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:17⤵PID:6744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:17⤵PID:6752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:17⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:17⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:17⤵PID:6192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7392 /prefetch:17⤵PID:7052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7404 /prefetch:17⤵PID:6916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7656 /prefetch:17⤵PID:7188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7648 /prefetch:17⤵PID:7196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8176 /prefetch:87⤵PID:7816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8176 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:8064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:17⤵PID:7308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:17⤵PID:7368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:17⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7792 /prefetch:17⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5264 /prefetch:87⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:17⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5127563585499293710,4097595557355090019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5816 /prefetch:27⤵
- Suspicious behavior: EnumeratesProcesses
PID:8052
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login6⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2368914559930277782,41077313927275101,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:27⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,2368914559930277782,41077313927275101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/6⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,18088899337965507998,4230209570268710878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:27⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,18088899337965507998,4230209570268710878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:180
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login/6⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1552,13042003454275246219,543730849416166459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:5436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login6⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,544912759136803564,10151390514184147716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform/6⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:412
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login6⤵PID:5200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x78,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:5268
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin6⤵PID:6104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:1508
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/6⤵PID:6236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:6368
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/6⤵PID:6508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x100,0x16c,0x7ffd9dda46f8,0x7ffd9dda4708,0x7ffd9dda47187⤵PID:6608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2nV4248.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2nV4248.exe5⤵
- Executes dropped EXE
PID:6724
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
34KB
MD564af5e859cd411f58ba7ade44f5a8c26
SHA1c1ccd85a8209e2bbb58c662f1b621d2cdf7d3565
SHA2567d3be672a50529d4ed208efdb7a90fa467eea5adca9bf877e18b167a4511cc24
SHA51261ec83ff7512bd438f0c7112111af73b1a6eedd1dbf515dfd19c41dc46e58ea4b998f0faee85e7fc75bbc2d142bbf6b337e52e76aec01f4c6725e9d733765240
-
Filesize
223KB
MD5253130eaad29f6b3a8d8e7815c0bd494
SHA1a4f9c43a0a8bfdea2abb714a89628d9ab53911f1
SHA256100b51f83c1ebf8717d0b03fbf1752724877a6c3828b30d24dbd649e1d70de23
SHA512aec0c1d01c6d5c934091913bac199ec1bcfb87297a02237ebb71659dda8040f64217fc21d535efff9ef994085d74c12a7ee6e8ebf711a83f5afa61d765b257d1
-
Filesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5a808183be7f9abefce5748a8d4b32235
SHA1e4b5d5b4d1f0e9ce728a3267dd3436b9eb41c863
SHA2560e5fcd975a0c05f043eff37c8afef8be79c5a1b64feda7feda4c5429d1fb38c8
SHA51238a8b1dc2a6d7055142294acbac6ff11867c40935e74673307dff5bfaa91a2d92fa3af9093fa18b76d71b89985a6546ea0d9270430dcd45731730b5a9a459e9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5e416eb3a92a052e522685685d7267e37
SHA16d334fb550b25d0a415a59ca570d6615b7483486
SHA256de94af14a77810491bee7dce265720ca7883fe0cec73002da0952bf954bde632
SHA512ae516fedbfa70d1f57cf038fbd9efef52de3d64dd16ba1ab8e04a377f6bfcf6fc91a4097dc14954cb26e67e1983ecc74e40cd5f12af0fe632c1a9bf2873552b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD53a24902ee6c1ad2e3f543b9844a5681c
SHA1dcb8e8de6c5fdab44e2c845b6a013c3f049740f0
SHA256ed09ba6295c4260b20f333cf83ad921e08acdf24ed27ae2d765b38e1b4dedb33
SHA51222347daed26cd9a776421bf7b9a8e03a4482a0c719d8b1e47915049d81cc3eb1a44e1bba70d2104d916119aabe074c449e84f03d6742eb4b4e38e674abacb14f
-
Filesize
3KB
MD5d947c75ebef92f209ed4e102336fe3c6
SHA1c71bf60d965a049a2726d65a45ce27a440424954
SHA2569497dc732a864c41e343ac3e32e36590ef3f2d6477921a9824432a06c71b2c87
SHA5126f1fa19cb5e06a96183815ec36531bbd95521f4f2d2cc106ddefca0442085d2b432825296bdb07fc5150f223110883136005deba0eb2968c7d1d960745958b1c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Platform Notifications\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
6KB
MD52c877f2131a2d96c243c8fcd533591bf
SHA178de8d6c56bfc82b90dab1fb8c52bb6c804f698c
SHA2564ad332dbde49afcd1e84ca543491212ea39d8527fd39620870c6b99d73c78093
SHA5120657684ea152b6b5afac10bc370b37c05bef0d0c90e67a65751a4425f6cc768f24e64ac9cf577d20e8e95dade0909c34d1cb70aec37b1e7897b2ec63bb2b84fd
-
Filesize
9KB
MD5be97fec7c39c2a48f7411733c174ab1f
SHA168fd2216786489e263e5d31163454da9fb91080b
SHA2565ce5eb1b68bb7f14dfed92cad1d06b63e4cb24b91a86b208f1319214d083d0df
SHA512c5adeca8ea609e8d51aaa96d1fdc43ab7aa61088e5f1cddb792020ce74aae630099a43d5e9e97bc9495f9fe7e20d84eae476893499518611e5d60a8660cf2a62
-
Filesize
9KB
MD5522a3bac621f2f6af7c38a5017d96c0f
SHA150c3802d9ca79d058dddbe067d5c72637f1d1db5
SHA256e64fd66c843696da965db6ddabfce124f7e977878fb97ddd566a9922a9280cb6
SHA5127855b349ff4d313c6e004564aa4c79486fbd1d51a037047b0fa5e246ad04a395e5b7c68904fed31491607ddbb00791d6e6b23d12323a71c64fc086eb227794d8
-
Filesize
10KB
MD550f20eb920959197d8884c99dd712591
SHA15ef77f7d7b0b08d012dfc904375324026f9e523c
SHA256727e5fdca0dd560a7e6c96c43303e0a44cc84ac06c2fdfa43f6c75f12d3534f4
SHA512d54737a8477148bc2914a20f68d1f3af93bcebbc306d6e37077b84e10d8a98980fc505fe578d9922601c220441eaa98caebcdb0be6276578535077255d3bd7fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD56da7214cbf7030dd81e850dcbf4ab7a3
SHA15bd7fe4e538274c31269043cf533f0fa3b3357f3
SHA25630b2922c526da84505604bf644129b0bd08061dfc65b12e65938d9746ded8f83
SHA512ebfb4c2e35cdd38186ce34f88b80d41d823ec84d2664c27286f7978527406f3264b01e947a9215172904bd78981d891404f572358893542c1da11d0dc3a5db41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5c14e5a2a85afc66ff404e34828f807fb
SHA13ddb0af16868e4c346919d96211693f1e4c19c3f
SHA2560859a53cb8a358a4c21db161095240038eaed725000abdf14b901307512be988
SHA512c912cc5d5159ccf4f421c31245f626799fca1187371228544dcb9fc16fa383165ec862ea2cf8cf2ce0511b6958480199de5801a4c3ec0be592ab9d6a3ce8a84a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5366ee9c5a1695ca93c9bfc4d14d7d3db
SHA18b74b4be53c529c4e73a2ee4220a386f908d2282
SHA2565da85bfbc7c8971bdab281a6ce0099317ea1ac663fedca4c1d2d2fe31615d99d
SHA512b709b75859ada14372dcee9be490e99aec9b8b00a7e918f7eae5ae48f792079786cea848b28346a930486a3f84bc87edf13d041c20f783dac147c3ac0b0a3584
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD543e9ba5297c34666da4ba83e26669f5f
SHA1f9c85ffd9c32886bb1023f954f615478eff0d435
SHA256cba0f4d693d65079c8cceb7a5b8f0c5ff5f81d3b384d04b7075a415adbebf3d1
SHA51203595662981b3064037f42e402b27aa4e6158b236cc94b57e2528a82075772766384264c5d7f145c04e722932b6a57680e390dd12953fd9e12990fe919627702
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe589824.TMP
Filesize48B
MD5f649e70e2aff8e886c7bb19e3007761f
SHA1fc406ba33ae51a89a1fb872496496f80e966dde9
SHA256e411e1153e736cf186846542e2469b8d1ecbb3cca358020b794a9ab2fe340386
SHA512a0777e44f37db3faa9355af97fc579bedb8d64ef75fa72042e0afe0edf351eb0e6f91cf48712ec31d00a8c6f72de2fcb211c62d96001718e154289b292a49f58
-
Filesize
2KB
MD5282167d2eda67ba1c375a2efc1171409
SHA1992d9d27326a45d11db771532fb63ef583c28142
SHA2569a90e8e1a5587d170c9596a2792a26886dc790ea1016dc8bdee65d012b9bb01f
SHA5124e6f9fe6c7aeb7bf7a21349fc7a5821d1bb43b9e5cee953db61707bdad95f1f266ff43b6ae839a1ae6a39d6cf272954c6af3d1a99ad4704f581b3e653e75b071
-
Filesize
4KB
MD5f0e018e34559553711298fa7665dddfc
SHA14def4536b3df82401cf5c9c99bfd14f2724b9997
SHA2561d8813cefca7b5f3940cae9d67a799ee99a1a34cb5c0228a6b11673ad14c331f
SHA512c9d757921e570fa05e2ab7d94f54a0b465c7d4b0ee8dbe92189c4ab70a8b2b9d3214dc0e861eba4fa7bce38dca402293dae3764ad1f1bfa0b45112907ee135fa
-
Filesize
4KB
MD5ae0562e48c506cf80428f2902e515ef2
SHA16eda42cc3f35188716bbe360f08d1407e84ee509
SHA256db86c81e3d332fa1eb435103de7bd627d887c750c8c3d5b341a63e33eab735dd
SHA512857a3e22acce519c097d4da5704d9defb4b11e6972a19cb9e89ceb0335fa2dfd88ca84baebdb86e9ebeb671ded170489719b5b1958ce4d341535665fac3e37ac
-
Filesize
4KB
MD590c7c1270c8cd6fc20e19097bad5c414
SHA18b97c12d6b0f35eec8b216831742add69f3b5593
SHA2561e0a6aa38b3fe2f3e59e13b40359ce45f68514f0b9c6947f34080883464e2a4d
SHA5121fb3d3302a48a7792bf2733d437c71787df2ed712bc26f4cb563e678c299fa18c65c03f81329b82734e50034c618b7b1cee7f87e47ad62ace815901e360cb246
-
Filesize
4KB
MD54aebe4d8ba52639abc36cfcdb50fedf2
SHA15aa05a5d371f6df57384543a1d34cec89428644d
SHA256e0058b9d77f420120ef25ae3234de4c0d05c6bffdcf8dd1134169cf116bc849f
SHA512fce94ab6e56193aa235bdf63e42b04011adbe1f3511dce5a77ba83021800cc698f8487f80fa95b1851f40ede96de6f20e627c7a1f56259294400125b08df8acb
-
Filesize
1KB
MD5b6581906455abcc814cf012b5623d065
SHA1148bbcd485e932bd0d54c6717d3649b608c0e0c5
SHA256def2e1095bfb4c8afcf04163005e7fb899d8fac55284378566a71dca7075c4f2
SHA512d727a0af3cf8298cc7877fb94746b095449561deb1d274bc460d5255f4c50647da1489a043796028e5c8aa9be68e9d28501393566c0ac701683e26dc76d28018
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD50cff5499bdc08fe1a952d84db795ec7d
SHA1ca778a80be3aa43c0ec6abd192d03884fcc648ef
SHA256a7ac29530e266234e53cbf716a47aeeb8b5a345d677619b397475bdde9b19bf8
SHA51275c4f590a999238eec3291c4b482c45a8b287287f9ba14ea514802d9754d88fc4e9bfca1f2abd56e09996d9b0d33a322942afe825d23296819ad431a38ac37b9
-
Filesize
8KB
MD58c64c8ae15ce0dfb2cfff705523b8746
SHA1a1071471c1de994712ad5537e023d59ecdc41188
SHA2564ca03972c241c8376d58319c6dad12ee2f1f7ef483b695ef6852a83369db6208
SHA51287e41f0a37caa6db629d0ed234282fc36fbeec2328bcfeffe215a283efe9e3039572f597746213b21306039abbdf9dff6170cffd9683456388f0553d75ba4b9b
-
Filesize
11KB
MD571dc1e20622133983ac0df31bc59b9e1
SHA1d5829ae2d4603d183248d2db23ab7676ac7a26ba
SHA256aec5e7e8a03fdb6a776e27450b81920b25a21ffd7cae0a351f783c5fa43472fd
SHA5123eaacc4d1a34566776485771e6eea97b6f4579866da617a5a11f40f3052f5c51d0798ec8927a42445784c1f377c0264637ded127fc23b387e18581ea3937f42a
-
Filesize
8KB
MD5746dbd0d0de3f9576f11a90c461af118
SHA1bef7b6861ed22f3d851323cef968d7faf6617c89
SHA256139365712d8c805427aae2b24712343fcce79cc694d0fb586f36afe9fe191b75
SHA512aec2bded2f4f1866f92861903e4640c51b7d502f64e5cbe863c37a9a1b2c4e5621ffaf3662618288a7c2a483be2d84188ea3833ee9218027e556f889af6b94aa
-
Filesize
8KB
MD5b95a2e07ad4efd841e8dbb9705792dd1
SHA18019f044dea0c88cdddcf368a1b4dc759bf15e40
SHA25612b308048722448636649b69c444ffd07a0f876d491c6f9378ef508c89e1db2c
SHA5123b8b1be3fd71a87a40435e5d1c5f473b8f70e1188af64981aa0f16ee2de6261521ccd00aaa1e1f7ee4a4faab50a663c70f04c14b161411215d5de9361d2e9c15
-
Filesize
1006KB
MD55a4cc0ca22aa6d9c49a3edbd064039c1
SHA14a167057587bd0f829682e9221d8eab08a265e79
SHA25623f46f99884d964c0fd901ba68829dee156ce0ee591077eef4a7f24d162cc491
SHA512e3719791b64ed4de7214984dec4c76d0f98cd71fb39bd351f83781f14613f0a539911170e4949421a7f67a60c5bea4e3e9425235b8939dab5fe7720684937f67
-
Filesize
783KB
MD58c1bcf96471235b3c42e4b6e51f4da65
SHA1c3b4863d6ec597e099edc38ec6aefff061c84b58
SHA256710983d4a10402be237ca9c1abd3fbae9597506ad28d3f20b84b2df84ba7b011
SHA5125b6ab14917c696bf43046d23795e62c177a97f3c14e5b4fd95a13a8c412546923cfbc4b15ac6e0e3c5a3a6d2a7133d790cdd86f14f255c40ec604b633066fe7d
-
Filesize
658KB
MD52e1b8548307003462be86fb50dc31487
SHA12666712fa7b61d72e7abd6d3b966f8276012c7c5
SHA2568fe85b3ac8e4e44d7877be9b7436197ce52ff60328d654b8bf03b213af885a34
SHA512df0e352fc96e0f73a7588a47ff0507a14673ef00387ee414c4e45a0b817fe29820a0d4d390ced2ab754cf42a5b633ac70233195e3aa116005d82eb25041c1001
-
Filesize
895KB
MD56dc8870b226c9749950a0b205eee0226
SHA1b218f2d13bbdf548f399d8c5de2690b2a85e1af8
SHA256a7051849608a0e4657a9c9330c56b6887f5fb5314e17cb21a8da86767ac1e27a
SHA512455b318f28bf2d5614b517605778b041d844aadf8a7ec8d599bb423a3a3ab6270ff33dce53363b545af13e6031c91b3964ef45d123e536fbe0bec6f4b873ea82
-
Filesize
283KB
MD51da59ad3ef1db6521cb35636d655f986
SHA1b2a7cde379f66468af8911621e4b568ff838faa9
SHA2563cef2412a38e9ef15c9b5a6bb6fa8117eb87a6c3b58c12e0da55c241c818e552
SHA5122dd42b129db128a90244b82805caa2cec36959d3fdd7320c80e93110867e3af569b487fdeed6a490e2dfbc3af79ae120cab94a1eb7c9540115bcd9b6b812e82e