Analysis
-
max time kernel
597s -
max time network
600s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 14:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://linux-scratcher.fr/
Resource
win10v2004-20240611-en
General
-
Target
https://linux-scratcher.fr/
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 156 ipinfo.io 157 ipinfo.io 158 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-200405930-3877336739-3533750831-1000\{F15C3E20-80C6-47C8-9A95-EFBD2E2CF92F} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 2652 msedge.exe 2652 msedge.exe 744 identity_helper.exe 744 identity_helper.exe 5884 msedge.exe 5884 msedge.exe 5884 msedge.exe 5884 msedge.exe 5652 msedge.exe 5652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1172 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3360 2652 msedge.exe 82 PID 2652 wrote to memory of 3360 2652 msedge.exe 82 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3504 2652 msedge.exe 83 PID 2652 wrote to memory of 3636 2652 msedge.exe 84 PID 2652 wrote to memory of 3636 2652 msedge.exe 84 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85 PID 2652 wrote to memory of 3516 2652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://linux-scratcher.fr/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe808046f8,0x7ffe80804708,0x7ffe808047182⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7156 /prefetch:12⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7148 /prefetch:12⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7100 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7032 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:12⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,799000226712673988,14530943922696055199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
2.8MB
MD566bedd84fa5567412c48a4eb66a7e316
SHA1f7fd312aadc9125ef77c91de9874e221cd04538e
SHA256a442a3276563419ed95f2f5601948b4ad32a725709a1405d6c651069f480c344
SHA5123f3b9a3d47701763ebbb8ebe3062bd69c43a24a548e86ad4c404266a80db9717aa77c737727d38d4f031fd92aba22d626fc9f575ac44b72122a901125acb405b
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
67KB
MD59e3f75f0eac6a6d237054f7b98301754
SHA180a6cb454163c3c11449e3988ad04d6ad6d2b432
SHA25633a84dec02c65acb6918a1ae82afa05664ee27ad2f07760e8b008636510fd5bf
SHA5125cea53f27a4fdbd32355235c90ce3d9b39f550a1b070574cbc4ea892e9901ab0acace0f8eeb5814515ca6ff2970bc3cc0559a0c87075ac4bb3251bc8eaee6236
-
Filesize
41KB
MD5db017f895f6edccb6b4fb37f7b41c9ff
SHA1813fc0a101ac1444be29925b12886e5cba24f91a
SHA256502ff981c025b86b293c4db5e45876f6fe0d7f0cba454888894b362ea2a7e726
SHA5122bbff3f7a1847123953d0b285297c6814a17442d25d75fc88f2a8e0aff5827b591df89e656264c3c5c12862a086fb2a549e1df2155f4ea3ba82319df69b713c7
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD5620dd00003f691e6bda9ff44e1fc313f
SHA1aaf106bb2767308c1056dee17ab2e92b9374fb00
SHA256eea7813cba41e7062794087d5d4c820d7b30b699af3ec37cb545665940725586
SHA5123e245851bfa901632ea796ddd5c64b86eda217ec5cd0587406f5c28328b5cb98c5d8089d868e409e40560c279332ba85dd8ce1159ae98e8588e35ed61da2f006
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD55e17ecb44019946c7765a2407846778d
SHA1e7056009491b61485c1634a5db5cf8fc83f037a8
SHA25638042e1506d660572e8ea02b243d4fe19ccaa1c3ced34aac019fcfe472398357
SHA5124632a9c9d80ac9fffab63de178f2e0c500172d1267cfc1832b29996ded2505d4508db4f53eab7009bae63ffe7f7e818c2f9597639b3c13d631fe904c455f693a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5b72ad6a4212a343d70176e807ad2b609
SHA14d1fbcc8d9e9548d9958877504215062f4b25835
SHA2565cad9cce77f8372ea43309e23882689d949355e1da34bc2cc568795a9aae6e9b
SHA5129b32d086db7e24b5d9b31dee4bd57d82a425fdf2adb9cb9ea5606b9f95fedbf3a60ef77bc80c6312900d3dabd1e64d47c2a53d3d380776ff044a30b1c37b1c68
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5baacce5f3591da96c35abecab0c9735f
SHA11c6d2a48471a954eaa3ad5a9e57b75d2b289efad
SHA25635adae46dcb4bde30b5ff458ada3dbbd3de634500bc5a2cb5fc18eb422b42e3d
SHA51229cf91adc6bad0ba7bc98b2f207ddcdd9b9ce54020e9b05ef0c41b0417591d9de401e2b42f9c007b476ec241bb1384860f007a87f7ad72cbec35796f317df300
-
Filesize
472B
MD50ef1568403e15406798a6f48637b3f84
SHA15b6fc2266f68183b99db69ba9fb521b827623853
SHA256ce3b47d8af121c1efe51f115e9326fa675c4ef42dfccd0f105e1da3e92c54a27
SHA51232ccd1269534fcaa1b617a541cda7fc2652ebce36c43cbd366a12b59a0422612ad8c641207b273cd30fd083b66823f34f5fd53c0935f4344b739e457b837ad7f
-
Filesize
256B
MD51aa0fe707532f1dc1f05702dd0f88aba
SHA17f35fc26eb2a2276e9ea61ce8460408c4b7595cd
SHA2569c9fedd7a0594c16cc3cdf0fe612db4bbd5b202899f4f7017d644c0aeb44ce60
SHA5128edb7c1685ab4133749bd943fa0c83b30f4ecfe77ff454bd3b6dd2cf104de5e5273b835f6c31d91d7e0e5a2d9b6ec02de949cb0cacac75a0f19ca7efd33ad11c
-
Filesize
5KB
MD56acbae07c57a3cd54eaf864481939f2b
SHA19923fb90155b18c84d54d28deafb66108b945096
SHA2565282cbe7a1366a0ea0376ba594a8652520c5534dca76a9c93e65a5fd6daa1862
SHA5121b64b801f3b583727ef2d92ed86840e74a99829e645092de26fbbb6cc9c9d2098191b3764b3caa961f381ee8689cf12e9931c35faf61e9207caa6fcc5a357fcf
-
Filesize
7KB
MD5dc1b67177e6319f076fcc768b3820796
SHA17f22f0a80a08a7d6cdf6a99a74ae39fdcd65e2b5
SHA256669cb64dfde9bc1efcd42ce9aa5b7c57252dfb69bc267223bf10edda4bc2cf80
SHA5128178f890d9bc375fbdf433f4fedc15b0e3e4a1e020f35cb6f24b97e9fe44ecf6e273fbcdb41d6871068dd2ae2f4e5d6b2a91da50533659b1e3a8dd0e573c06a6
-
Filesize
6KB
MD50331f9a3a164c4764954112084b358fa
SHA1f023073684a5978d24506200409d1a423335189a
SHA2566d2c2735eb939e8b068342b2dfb5d0499b4f06b74346e8def9766af803cf2125
SHA5124ee3c5036a56030c6172854368a9296f542effd1cd31c1f1b56a08fca4ad2cbc4e40a42edf67df176710dfde6c4096763bba466a7e2be1e7278f214cf25eaff7
-
Filesize
6KB
MD54fa74526e991429112b6a66681a92d8e
SHA1b97a6d78933334f7361bea1a81637fcfa226b294
SHA25683b246e247dcac3fe3ca59836cc432072e716855b4b032de37191a0f3e9205d5
SHA51201026fde1787d710706ad3f5c70d409e3098d9ab7da36c7d6e6347fa3b5f98c5154a25a75fe6d0e834768c636150ba309ade65ae886784de84cec9fdb35643e2
-
Filesize
8KB
MD5563d937e08f71a7ee2c5f5c05c2692f5
SHA1cd70e8c9840b4b8a53604f13874f5269e991b274
SHA25679b8d867f9c6ad5d2b9e70c2ee9c8b3fb13c4f43cd80979fb2eaa7445efa7076
SHA512eb6364f9026ffbca5ed1a4e8abaf2b4af2813a949abb892616bfa4874cdf0c241d07181f739233735ea674cdd5681bcbc8378e19b8e7fc47d7d6b6e658e62b2c
-
Filesize
7KB
MD5087279f9670b7d9b580f1b05b6ddfd5b
SHA1bab2e294e7b0bca10e4c07b01238cf4e6a706902
SHA256d3f7bd8a24f546d685fce4ad9920638e8108e50ba725524de52b7214a5fafea1
SHA5129d299a105d020a24dfcc1afe62acd9f76dd5bb1533f9e694a1cb5d655871f59d7ca6fb80ab759db278646186e009c4ca2fa0b1dc32cb17a99bacbc1a2a1f6cf0
-
Filesize
3KB
MD5aff8e7a068a86e47d5b78777896d4341
SHA18ff222891bbea48b718f06553ab01670a77c3c63
SHA2564bf307b2d8f21ed1875f1cbc53880c9be09ad4c713223d4c73e8ce83173f35d2
SHA512c79dfba000efe59da85f0bed26042a3322f2d42d8e79b8bd8f20491960d71599dd9157873daa652fb5c248cea68aaec592182ef4137c121f7d4891f2546471a6
-
Filesize
3KB
MD57419cef6e769ba878a9d63a227c10435
SHA16ceb759415eaec9ef91f57ede47d6f0f3fa4a87b
SHA256fa9964b2e742a053874cbd44d7592632ba3b6e7131e62c3dd48d122d2d607030
SHA5128b3d29a3bf712baefcb4f78522fff62390f62df03092547e84202b45fea7254d5e4bc28fc2eb212f24b658bd9f0bf782dd5604647d0ffa6b87a08574cddd1b73
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c9de0c591647c42d981d084da9401664
SHA17ff1af10af255e07f5f67e92e3e25b5d8e15ff1c
SHA2560adb61d5bd5283a9b21c4de02fa6901c262cc4a45a1e8969a2b66512766bbf49
SHA5121f67167e637475d83885d10a0850e20a7463886abfa86f01a3a14925db123e5565fc86244356b550c77aeb1a7a1f9e07a332a919d32471faf9d0a33c2950589e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84