Analysis
-
max time kernel
153s -
max time network
244s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-08-2024 09:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://evon.cc/
Resource
win11-20240802-en
General
-
Target
https://evon.cc/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 4704 msedge.exe 4704 msedge.exe 4144 msedge.exe 4144 msedge.exe 1988 identity_helper.exe 1988 identity_helper.exe 1644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 648 4704 msedge.exe 77 PID 4704 wrote to memory of 648 4704 msedge.exe 77 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 1248 4704 msedge.exe 78 PID 4704 wrote to memory of 2648 4704 msedge.exe 79 PID 4704 wrote to memory of 2648 4704 msedge.exe 79 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80 PID 4704 wrote to memory of 4600 4704 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://evon.cc/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffed1fb3cb8,0x7ffed1fb3cc8,0x7ffed1fb3cd82⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6944 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1240 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaService --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=6196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7336 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1985726336145553861,11510654634278350209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7548 /prefetch:12⤵PID:2332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50487ced0fdfd8d7a8e717211fcd7d709
SHA1598605311b8ef24b0a2ba2ccfedeecabe7fec901
SHA25676693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571
SHA51216e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993
-
Filesize
152B
MD55578283903c07cc737a43625e2cbb093
SHA1f438ad2bef7125e928fcde43082a20457f5df159
SHA2567268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2
SHA5123b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD583a31db5e8a94f91e31a0c1abe92093c
SHA15db19f852fa3be51587557731287369e15a6716e
SHA25677131fff09f02bc5c565abd666ce220bc4f892601b91b723d7a23511416ffc4f
SHA512b11add73c597356ebed1630ece09d95c981549a90cb9074e0acc2a960a256d0b6aa36789f7669eab2f296760703aa47603e749d4aed45259474b1d3969dc3e7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
7KB
MD5aa497e13a3ddd1c7777956f910bd6631
SHA12d423e76c62e3d2d08ceb79335c69685980b8790
SHA2564056af0603e748889cc9dbd0427b67219ccbbe32ef77ee14dad83c6aebd1eff4
SHA512a37365eb23216d92b31cf152856afd4103ea6037df342fdb650d1aec42489290ca553e90db3e1c561dcfb0d10516f2d8cc97a03520fe99819d1ffd452dc6c684
-
Filesize
5KB
MD5b0d4861d4637b43b2ff60fa8f7cc9e7e
SHA11df8b6d9196ef3ee9eeccac6335472a741e922e6
SHA256e9000cda4f9d3d88ec10c248a20b3c81deda05eeaf33705c1d9d5b122bfe0775
SHA51292088621fd4e28e8c39642c118a5f0ba49e3f1cee67c481f5414a4231e6233135a4dbbe1ca6afbd8cff9ffa927c2b0faf1bada08f880ec08dc485800e0b0c21a
-
Filesize
8KB
MD5f644e421a95fbe34c98bc31891053374
SHA1b76051c19cff2820ff2d0f2fe055e7402ac6c5b8
SHA25655faee59e4476b20c911ddd9b3b2ff0136d1eb0c28112217e80db3ab3a7457ad
SHA51205c6914fef11a4178cae32025860fa7cb229fca1f07e3685a1ba32de0cb87e2a5e9a4a54eaa1730f23f70c91a5799928da6f2df0da6a80d64c14f3ac5cb373ce
-
Filesize
8KB
MD55eb43c49b0f4b62709c7b0c7dccf1371
SHA188f0fb0b49674a744f409d97416d750b6d3ca22d
SHA256f3842204fe82475f903e12cda5a4c8b362d72cf578c2c3e92dd3e6da44999de7
SHA51268573de055b3b10b303893cb948e4bf427e1eb453ba5ed516772a8ab089fcda1fcd727c172617f771fb95d45515e39ad4d97af0c2690b4c550aa6e8155c2ec3f
-
Filesize
7KB
MD578b8e11efb51e654e4a56cb10d24c159
SHA1ed5337e96f7e2491bdfaba0bdb2d520ef1ee7042
SHA2563924bcb1c4b364b5b0d1e006083fc570ccc07a6fbb66afbd69f30510fe78ff77
SHA512199d53a1f1207e936997c10c0350d594ac3e1949a8ce7bc7e4ef31f5991572ee96ef23220131d54f58a3cc49d97814d91b2cab6343b3e670eadb9c6399c34e10
-
Filesize
11KB
MD5710fa71c0a84e52228ae08b356d254e1
SHA19744be147f7a3132ba278fa7e823bf42ffdbf18c
SHA25635356639c375ff1ec21298b5d0e2dbde387a116781f3852ff9f5f68b858282e2
SHA5124d8d82605d204ba5ff156f83360fe8b9009b39eb77b1447ef98b0a30f9a0d3206034c9f0cbd7d2d3c2466e07f5e07f961e56d5ef8d61befdc99c8dd6a8768806
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize120B
MD553367bb9c167f056c88b376fbeaef7a0
SHA16d0d10471f53863010886f789890da35a1f37fe7
SHA2564dcb60614563c191a57f4e3ec097fa2803376956f809875e3f8be116ae9df308
SHA51253128653614b48cb5197cc50531acdffacf799c4f188a493d0e4287dec4d3015f8fd04ec3106c808dfb5fef1014a4f3a9e2a2c965eba3a48735f8f14a6ec175e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe584e88.TMP
Filesize48B
MD52021054a8ce80ba2eec5466a572a1dc6
SHA12f1bba870359e97f107666e9db9c248c3d4e9647
SHA256400925ea0cee8fa95da7aa40d72ab2f640dbf8d89f5e30f20c25c037604f7540
SHA5126e0166b13f85519a4207e755278b516b4118055943029537ae7d18152456c66cc29fa5ee81f008d63924313806cfae7f5c40fbe80ce4c8f859db745049d1c16c
-
Filesize
4KB
MD55ef8519d25bfccf566af487c64738e6d
SHA1f370ae861390d0c7e0b085b57193b230972ca5d6
SHA2563f70cabb1b77d625dc0ffc2fe27164cfb80682171e7c748bbd678f0caac3f8ee
SHA512186aa856ecd9389ec1991362e820d048f00cef2f5f9657b9064d5e0adeae2b1fef64bc7dfbb595ac7b70208a132dc457bb142cd375305dbd6347d54428d9c7be
-
Filesize
4KB
MD582d281b62268efaa083aac23a3b5747c
SHA1de065d1df2abf1add304deb3b0acb10d866bbcf6
SHA256f8db97fdae67e13e80384e45593f5cc803960ee4855785cf602d71b48e723956
SHA512eb4b32e71e04439d3cccc89843c7d8a8105b2f5c9ffdb0b6e1d7f9cbb5939e20743682a034025d1b315b38b1013474723a243f3142e56d5cc5726628c0944ac3
-
Filesize
1KB
MD5b15bce27fd308586b843ade440d75160
SHA10ba32149f1b581d8f35e112629d04de238d2b04f
SHA2564447ae8ea169cba20f9cce9b8287be9909c93f177704de1132e6cca1dc86c227
SHA5127ce240397986b5c031b366b1c811da27b179a85ff81fb11a7a216b95e2bb01ae1f6d08cab13b3aaddaad929f51c1f5cef22000bea6110df4699f5c9a78d1bc2f
-
Filesize
1KB
MD541389ddfc7a8b617f5efb0aecc555633
SHA15e3e9ce9e8bcc2aeff51a6565346b50958992e7f
SHA2562abeef35bb6ddffbdad67f01e6769bb44ecb3c5798e67b686eaccb559b953c14
SHA512cfd7dfb34d8f0b75969d213a0083861bd27fe9674914c0418ca3d0bf52b42bc85c020abae99323c41c776465fca7effd6a1ef89fc047ec2eff187aa249c519ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e1f82aa70b43481120c16a11df96b10b
SHA138f9964f6393aa2cdee323f5c0215d30c2881084
SHA25600238ef66509dc04200cf4d6550af99ba21b285914206eda191bc59c35b229cb
SHA5121c3622597096915ab95552800ffb7a05a434672245299519eff1e85e217f65aa86849c42bf11fa6bd74d99f5f2d7a98d637a772e358ad0b85864ca7af008a8d8
-
Filesize
11KB
MD5199fb08a59cdb9800d772c9ae921e38a
SHA1e61ec56dbf3784e26ba2ff30c367faa0c4136e33
SHA256a5af2fbfe828ae34623fc1e3fe805753568fcb1c57ef1f90760cf2e026138d90
SHA512d6aa7214bd8b23b5e74e72f2fa007b084ab0aed2c9d5bdbb5ae4e378c6eaa3386d394e66d6074d2d893cc16b2140a27cf63a3f71bd90f3140b6034b7d9f44f86
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD5d69e46c669dffc3251110c44be84c772
SHA14ecb870821363e5c986877c990c1a58baa2ff5a8
SHA2566d4a616f04c5279f12a4ec4401d13bb9d01f4bec6691467255cc8bd4b1aa9a6b
SHA512bee698d5eb90924de7f2a3f54f6442587dc54f50a8b7267cd2034aa996b3c1486ac78b1d39dfd985ea527ef28fd8bf1a27041a3530f15aa7bc7018069fbddcce