Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 10:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://instackish.cyou/?SUBID=$2407311334b38fd73da9b949178f3cb99c0c&campaignid=3053759&zoneid=2015069&cost=0.00030635783
Resource
win10v2004-20240730-en
General
-
Target
https://instackish.cyou/?SUBID=$2407311334b38fd73da9b949178f3cb99c0c&campaignid=3053759&zoneid=2015069&cost=0.00030635783
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3089151618-2647890268-2710988337-1000\{7BD22DF9-83BC-47FD-902B-CCFA05419F38} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 3736 msedge.exe 3736 msedge.exe 640 identity_helper.exe 640 identity_helper.exe 3012 msedge.exe 3012 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4856 3736 msedge.exe 83 PID 3736 wrote to memory of 4856 3736 msedge.exe 83 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 2392 3736 msedge.exe 84 PID 3736 wrote to memory of 1216 3736 msedge.exe 85 PID 3736 wrote to memory of 1216 3736 msedge.exe 85 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86 PID 3736 wrote to memory of 2132 3736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://instackish.cyou/?SUBID=$2407311334b38fd73da9b949178f3cb99c0c&campaignid=3053759&zoneid=2015069&cost=0.000306357831⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0a7746f8,0x7ffb0a774708,0x7ffb0a7747182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3128 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12580070553214383315,11197958277422431057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:12⤵PID:4032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x51c1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5506e03d65052f54028056da258af8ae6
SHA1c960e67d09834d528e12e062302a97c26e317d0e
SHA256b26d2695dfe8aed4d0d67d11b46d4542c3c9c8964533404dfe32ce7a3e6cfb98
SHA51215da55267433c41febebbe48983023293c6d436f89a56138cef1cea7deb5cdd7d4bcf58af12835e1152a8ec59e08cfc965e521eb54eed47fe44e1f4c2d1557a4
-
Filesize
152B
MD5a15dea0d79ea8ba114ad8141d7d10563
SHA19b730b2d809d4adef7e8b68660a05ac95b5b8478
SHA2560c4dd77399040b8c38d41b77137861002ef209c79b486f7bbdb57b5834cd8dbf
SHA512810fc1fb12bceae4ca3fad2a277682c2c56f0af91a329048adbeb433715b1f707927274e3e4a4479222f578e8218663533440c71b22c49735a290f907cc0af1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\63c793b2-0e83-4f59-960c-20a3e43ba1a8.tmp
Filesize1KB
MD501f46f78ffd108de662cb8a8e6f94d24
SHA1f24a67a3a3caeca33d1894e106dd5b0ac8f8a0b2
SHA256983f3d2c17403378c3c4aa91ae30015bfe13b9ffda928dddb6293dcec167cd50
SHA5121d91aff30d49700057f3cee6bbd41a8960c242cb8c34c9440c6cf01042fcdea0edaea8f2add7f1a035bb575f032788cd8e71136d926208d839d3860acc772267
-
Filesize
229KB
MD557c541221efeb823a27c684f30a80469
SHA1e957951d9c55c4d94f40f6bd9cd392b4f8c11688
SHA256eb469eb2741dcddefd9bf7e33fa3027a4d1a25f8ecbc267eee7f40667f526ce0
SHA512e4fb117cb65026cbd7a5567d018f3dedaca06dc47321b2d91ce7359fc0e0e9704de9b59a4a2caac491ff1680ed88fe4431960af5b01c0f395fbb1900101ccc5f
-
Filesize
20KB
MD5644f2b0ee81b56ac7303031ab3ca10e4
SHA17ca67423f0ded5ff534f0a0d42df416b44d36805
SHA256dda33f363084c0f939d6daf5e648ede370fe5be24bd408a6ea0e6bfa1042e6cc
SHA512461b910c1c3d43d5e62ca18d8a2ec7c9a3db196d649c08ca56d92a8a5e39a991fa5dc53ee20572ecb93b3315b0ba2e2a0ba9f5644c61b2d2c81ef74c05abc39d
-
Filesize
47KB
MD51b41de287931f25dcfdb32b449b62dce
SHA1e457bbc7784ceacbb11cfa3ff65571de5c0ff227
SHA256c1fe59b2b1995ef9709e1dcc147a96774f04c95374ca1c4df0c41e1cfbaeb8e0
SHA5124d1de63bd0e1d61375a72252f41be91a61d766b3b204a0e72bf6530195a3f26d89c8aecd75e175281287b3b3b56a71f964ced207a0037641ba8c893d2ef75c78
-
Filesize
747KB
MD5b81ace3b4244eb24aa6f719dcb7fba9f
SHA132d47f92d659ca2d8cb6676f1e49e8eb60ce5607
SHA256d0b39a681e75b724c42d10cc205349f04adc2dbea71c41e2825bb7cbf62ca539
SHA512f5f997d82c37195e7f5256133f8d00b3532cb91b7be850d702ba2f40f76a7b7e36671b73ab1ed9fc0f5fe97055a15008ffbbc61c34ebb0d84f0e44e632b0f366
-
Filesize
32KB
MD5610293cf4ea82a578cd1887889626ad0
SHA18f505a4584e51bac66f9b6a623a1675e5cc10cd9
SHA25666753c185ee3c839fa84adad3e2809f4419fa87be1a4910d05997ff33a783324
SHA51280103e0a65015af0f79c7c37f63fa9ad7bd0290cb7d1f2324ce17811b3a125af27f02958fa4d55590f4f8d29e444245066127dcdf201c9f522e00b79f82e2e33
-
Filesize
32KB
MD59d01eb0a17ab073b23578fa43d8cb8ff
SHA19494cff21da72d4c633827d4316b5b3295e837f0
SHA256c262b68986387896023519db8825e3ed1e080d5307b72474bac05ec98185c530
SHA5126c78a5cc939506d590dd63dd2a630e92ce68de84e4055e093bbd3a2f233243da12e315f5ca2d221948e39d5fbc951b1e958da851d31b41b9a86d29a133e3b3b0
-
Filesize
578B
MD55cca5e30b6c98de7df6ae52bcaca080b
SHA193ceba2dba8868c536ace13bf896ab1e92122625
SHA2564b17c0b6136d718f536772bc5d98e1fca5e5fa7a45066953cbec732a19130ea2
SHA512b1add8ec6763ac39b4a94c78e4c6a67a46a7d19a64219dc16e81ac6a0ac2f3f69d558ddc15b81281c3fdb86b26bb88f7399a3f02b436fb9d144c2616dddc9e9f
-
Filesize
6KB
MD5ca9df1df732d076ff75719cf3e97107c
SHA1d07dd24e1d1d6ff140dbea116a087d789d93bdfc
SHA25691d982363521b3e28b4534321f567b4b88307c1e0721f60366bffb01f1e98318
SHA5129438d75bfdffb96871d5134cc2a1ab0036d4c2ce10c899e37b29972b2a355de677ba50e6e33ce4ac9c42acd1aba12d284a283cfb8f87d7807264669eb1fba30e
-
Filesize
6KB
MD517a98f4e1a6f161a1f8eb251a06b8108
SHA1c8128be1ef85079ceb25c11719454950c6b5f39d
SHA2566d11547c563afaf7f4b0ff58d9f86cbd5d64f3f0ad941e4fd84394ce0b8f8bcb
SHA512eac86b272fc652f8d3fcc1372c41d412aa14f8b84fed8b476d3b4bb109867da1f901a42ee9c0d31a94d2ab3dd99dfe177bdeacac589733b0a2861892b3f39ada
-
Filesize
7KB
MD548172dc9db89535f42f5bb396578b977
SHA16bbbdcc6ab7b5165ba9afb06152e6138c4544fa1
SHA256a2516c97faddae30babbb1b8fb046d0b7608a923152a153fca43b97d9910541a
SHA512f1eeb7807ab28f34563cd23f6c316076420e9e98939e601f6e8c180efc0789db697fed137057c1adf971ba815728b736a3b59e676f63d3d469700d8a698b128b
-
Filesize
6KB
MD50f4c2a36cd800cc08efac4ea9053141f
SHA1fa14c5006ae20acab5927125c367ac0beba43b63
SHA25627217ff65587c53917cc7d4379cf5a5a3102e7990ec97c601d93f015d8b7bf40
SHA512952542c4d9b04045a32a28b44939d0f96c8c2b87e78f34d4be06474e4c024b621ad8e4116a35aa1ff088e26f35dfbb2a57b7cab47e9242ec28a255b86479c2b6
-
Filesize
7KB
MD519b78586712d20373595f92bb106ed53
SHA12b792e70e9cb3016e63ffe06c25a9c38036e299e
SHA256d8ffde7f389fd500162f7daa59c04a6302b1439eda8ea0787dc0b8509da42a71
SHA5126cdbaeb2bae52a1f57419be8ac092015bffef64ecac6755c29899e537fdb47ded82cbc17c403c415953d080f3f7ea3ff87d23b83d4b60d63a10fd89300091d3d
-
Filesize
8KB
MD5962fe0c1a68bbef1963f12ad97da329d
SHA1bf392d90a809b1dedd1179b71bf55f6a6912bfd0
SHA2568a5be1bcb31b20bc2abedfe141da8a732de2c2476e0ffb703cd3d51a8f20ef91
SHA51223eca121322aef51d491e25d4bbcba00cd015120b426fc2cabf46f2541ecdd8479184138e99d5b94b013019514be235296b13c1702ee03920e47ba8c7d538978
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\04b355b1-8d1d-4412-8f6f-88f53eb44661\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\cba01760-3887-4e1b-97af-9148ba10ee53\index-dir\the-real-index
Filesize2KB
MD5e615eef3eb7e6bda068ce053c002b40f
SHA1448adf0c9fbc515d1721596581a56b652e507dac
SHA256a9f44f3929c3ec62d91f4142704cf9476e8277fc26223a873a38b61e85570bd1
SHA5120e3c6020b8f2f8accce37efe6c3e490a46ec19aa9c8c970b7b5bdbd84ecd42d5361925339fb7ed91b52311aa9111942848414eedb647fdfa2a255058e150ee7b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\cba01760-3887-4e1b-97af-9148ba10ee53\index-dir\the-real-index~RFe59d2c7.TMP
Filesize48B
MD55c194f13af976d82628ab92b44ea8e86
SHA1fa9476ee03c7fa5985305c4abf981930388179d9
SHA25650b8bdbc96bcc27ac8897048a4ef899efa83fca8b692fef12af98a3898ec6fe3
SHA512619e6e41b055110f60916119374e4b0f6d4965b7f0134280fa13d236e6264dd3d788920ca201e9268123bd2f5eb4bfbb3afc3a054d5acc786bc75b1e51812e39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD510de6841eab90fd5dab717412e306913
SHA15ed44c7d9a75e59f8f244c28141050ec5105fe28
SHA256c2ca08f930ebee486ef47c09ab69bde6b3e50bb9240aa83201e12aeecec81469
SHA5126c4ab4d3e6efe50f291ed8c6e979bd39a30660787a28300271308ff4b68bb63e3f11af3abf695531933bb70ef6200f82c9380d03cc5ba8ca4f0e53ce763825cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD534658f16d1b2ed967d3f7765641aafb7
SHA171b23502395c390fb81d2b1a0f3079a35d284b86
SHA25634fe79581b4fcfb0b6bfff7fe03190c9c93b80cd2e87a07a3b4a14c61cabfba3
SHA512f638fad934be1e65a100c322fc9d00018c0bf00319a2a6ae4e0262d355455b8062a62cc6e82ddb521d1ee9fe034aa61a9e1e59c76494d2a6421e9496ac8cc232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize148B
MD50413ffde932765149922481a29a5bf14
SHA1dc7549b4b6337fab18754a7d6276acbcc605885c
SHA2560706b01e5c8f97cfe35b7e8a11b734074b4b555d1c4faa4a8a5a213693c26353
SHA512cf509c09431a5d3495aac1fe0fe8c0579d2ed2b031faa3eefca3da8ac5f5dff5fd1c95b9186627fbaaf841d80582981af48ae94c8c8c1daabc31a483aa16c5d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD52be3b6636bc926a7e5e4459e16ea936a
SHA17eb67453944af12612e47d674812d46c1d1d393e
SHA256a490d664e6775602aedf58f14a011666a08edc897546d9198e3a89c17cb34b5c
SHA5121097dedc41e1d43f0067218ff8b8c75eec93eba8dfbf9e2a8fd8fc77ef068334195ca57a78948c575c51b9c7bb002a174c8269ca3538195df18a0b59df8839a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize157B
MD52c4a054801180dc35bf90ff69f42950e
SHA1689147ad544bed24d6681803a07d50182bb81684
SHA256369667a04f6fdbb28122cb924d83271ae84f3f98ef7acdb74bc71eead2097006
SHA5123fda4279c77925c8114a02e429067c83bc85146d2fb002e41b532ab7076c4874dcb3301c6189c54e2af54e922b6f5b97cdb87900c387133d2d0ace39d6034e20
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5c093bea6691d32e2438ef0d6a3f9c112
SHA12ad3d2658531e9f1ddf90e3bd5e2a02e671533d8
SHA256bdef81f7f37208237068d27d9095444f1c9ea2b090c3d9bd97456d1e2522f3c6
SHA5129a050287c685c1cf93b4cebdd36101f8df0ab2b60e235e4fec46fc5fec27282ef86001953440ccbe7abd7e229792067b1b8221924015f66e9aff37628b0679b2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5254a619104a3bc549432777c6950da1c
SHA1c5da7509760b119a31188122dbf81deb9e72010e
SHA256f13b3fe7dc458bc3e90f31a604c039a8082ee84b1dbdca9cdbc031305a83ec4b
SHA51244c5f881f775177ac83f98f8a853c0bb4c58b8f1a5fc4d7e5c912ea67e155c6b2f8f940e0abbbe52783af41523d983cda524c0b3e82902d2b659a59c1feb7bfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a2471.TMP
Filesize48B
MD5029e2050950142e172e83cd389d912e4
SHA15f856eb7ff0a9277c75bf10e7fd592728c47d830
SHA256218fffa0fe7892b891b1eeab732135b250d943ff6572468975d276b863bba824
SHA512f777afc2f5a9e2c24f27474a261a9353c802c13b686ce1ec68802146f2b0be58d34bf7e6062d5739e8e73691b6b41e7244cc6682c80edea4547db629013f9413
-
Filesize
706B
MD50a3c0f93c110158caab5dea609136f0d
SHA16eb8d62ab3bcc85e10cddeb3dba8ff283283c7a5
SHA256405d07427938bd6e786a518c354813e120112588d6ce5c5a9cfea1833ad91c7c
SHA51264f2aee497e47383834eb8771256e5efdb4a61d95e5a4598fe138319638045235489d5596d28e153b0dfc04c42dc0def52728fbbc46a5dcb0c9b27ab41406739
-
Filesize
1KB
MD5532b6a73109c58e146e99c429e9485cc
SHA19df6f247203e5c92249bba11854becb003584a40
SHA256274d5a18a19444521fc1ad158b86b6c398cf11a7d7f8ee03b3dee2bc4455f63e
SHA5122e21d7ab60eb0a2c54984e2e35fce3484aac0527671df557591c2d3a0ecf231ddb1079902ed87b7a191e891af549c278c6ce0a405bbbdb9342aab9f66173b387
-
Filesize
204B
MD5409899edc623b9de87194d3a00d8ba74
SHA1bdabf7e571b0634d0cb2d538265f9f644376bfc5
SHA25616194d32f19d755ac3d7cb1d8f4ef7e64035d180ec13aa42d656acd0303e312e
SHA5124a2b60d3a1158985423f312afb06a8356cea71337b08a65383fb379459cd92d1dd2369633fd6de004d15933ba2048798268f041c5156a4a0f9e743b22579958b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50ff4892a669e4624012cd2716231791d
SHA185106f90a66ca9129d421589d612aa6101bb5134
SHA2565c6dac6402a1d61e0b6cd960909e386866e2b67707c146318f64e4795c3fc222
SHA512ad4ab3f7c66aaa602d0fb7e3bc3340ebc62f4eb8a5eef28063b1da3763449b1c8db44c8b87cc432fbebf00cce4785c745622d66606e3d7adcc982e9dc680cf1b