Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://celery.zip/Download
Resource
win10v2004-20240802-en
General
-
Target
https://celery.zip/Download
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-945322488-2060912225-3527527000-1000\{DA1A6927-6C6D-4090-BDF1-EF5D9E447A17} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 3008 msedge.exe 3008 msedge.exe 4152 identity_helper.exe 4152 identity_helper.exe 1368 msedge.exe 1368 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2096 3008 msedge.exe 83 PID 3008 wrote to memory of 2096 3008 msedge.exe 83 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 3860 3008 msedge.exe 84 PID 3008 wrote to memory of 4100 3008 msedge.exe 85 PID 3008 wrote to memory of 4100 3008 msedge.exe 85 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86 PID 3008 wrote to memory of 2556 3008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://celery.zip/Download1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb12246f8,0x7ffdb1224708,0x7ffdb12247182⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1316 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4844 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1656 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1968 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12327318698056023725,490135710392053444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
54KB
MD542c04a4af89303b08df2189c900d28bf
SHA162f7e35e253478cd3dfaa47760f26939c38e998a
SHA2560c9f3bed664893f4afda583c9c6fea8d02a7f0d24bd52792a46758ef4fd0ce64
SHA51250c71acbfdade9329eaed80db068709e2bd0bf4503987f50e8cf02c8f6061335755af8dec38dc8c5859d6bcc788f8cb7955c249f9f5c597266b1ad2468b7254a
-
Filesize
47KB
MD5d4fe31e6a2aebc06b8d6e558c9141119
SHA1bcdc4f0b431d4c8065a83bb736c56ff6494d0091
SHA256c88db2401bef7e1203e0933cc5525a0f81863bfd076756db12acea5596f089ec
SHA5121cbe7641b8930163ed3ea348f573cad438b646ed64d60c1923e5b8664c3de9c2c21ba97994ec8d886f489e4d090772b010de72a1167547fb4f6a2d242d46aec1
-
Filesize
32KB
MD55f837b923f51b6f2ba4d6b136283cb52
SHA1f56ab3ad223a932af1b7298cec030593ae3aac0c
SHA256ef8fd5037b886f28199f80afacc3f416a6dd2d376fe9a6923dd3863cbc576367
SHA5121d216de866ae1da6b3a78847895b65d092c41562a1b4db9aed381366edb164985733dc5809eeb5463685296336ece7ce0465b1762e84fd228e7b007333b66044
-
Filesize
453KB
MD50c885d2b584f44a53284cc8b8e329e52
SHA141299d707ad248d0cba05d707671c71c1ca2f09b
SHA256936b2b2aed05be996a14471472204107732668d51db462337c47e81f2ad36d8c
SHA5122cf441418ca7e97bed4d508fe917a7b27af6804e721c076821d3f79ad62a3e6e7e03344f0ced5d1be83e013afc0e285ce2626497bdbd645afabc1dd168476330
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD54fda9b0081edf7a0d87f4e46b90ad305
SHA1654347b3d621f5898bbed88543eeb1ce4ed5b899
SHA2568c8cd6b5bf69747fa817abc84f18e13387ad1dc2cabb5fe002cf50a7ca4a0509
SHA51204ae182456fa16e89351a8f87556098208a667f8a2d43ad1ccaa81b04bba4b49651d9c88aa1a7ed36713eabedaa3d304556f05a1446e2eda2d49c0b330a06d19
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD58cc60635da995a760b51ce09e758a349
SHA1a19660260c77fe50a7e44844b95fa35555f14724
SHA25633682121242cf88b84006b53d9c08ebf58e5bf30363291985712fb783108bf2a
SHA5126eef21c49ceabc822de0c39c0e8ef86fc78f64d70b4746128fe96287928023ab8529b45da18d122c8f23521884e65c1700c1858ad6cfc131a5584cbc09adfc5e
-
Filesize
547B
MD56623cfcd6774f15fe871f5d0def167c1
SHA173859bacb9e1c78718c9d64eb567e54a4ea1ba1d
SHA256834eab0e7924d888b9dc6d108ea3a8a224e27d72be1249b39ec9973877d86b97
SHA51203526ad66db0615ab7fa7854efe84859af7252e969a27beccc78c9375d3dc4c18e06ae9633968d85ee9ce6f0ca9f9e77c89128501d7116f928cd9d7bc31b5d35
-
Filesize
6KB
MD55a58236b7917f481b6502b8d175fc452
SHA10fe296d67acb71f9dca1fac6f4d071932624b6bf
SHA25675fb433b8ff56e2248b339d0c18969108c761ed7728f41cdfe5aa8001769f92c
SHA512db6383f7e8e135afaacd15d1924f4388ce727086507db28cc1f26941135f29cd3967f0c621fedc5c57ed1e307d88fe58e8ecbcf1761bd32f0e87d0c2504dd6ee
-
Filesize
7KB
MD53cc33b5c6250c33411aff16aa304faf1
SHA16ded97aaaf49027cdfe51409637fa1fa1a9c3357
SHA256862c05bb3b70c407731cf8df8b78e0752671eaa750206e13cc417ab8fb69f958
SHA512df7ad5e529c3f22ae0a7e43e529fcded9b9b0a1ddf233fe3ebeb2fc000694541dab88070e148b0d5e265b6842045522c7aaf95afa667813b366dfcc77329fb4b
-
Filesize
6KB
MD5da1b4e3280b3db91091d5ab1e1121b0d
SHA16dc4e1859c6396d3cef92ad57c0d0d064ae9706e
SHA256e94344cc89697b327e3b7d2bb5fa1611c07e04c1da2c6f0810d092317431cfba
SHA512c70a20ef828af24605d3d5684c5ad374c5d9e006a129832460139401b03534cb6beb9cce127dd54e0eed61a74bdf2281929aaf36dba4f37a978cce45384aa830
-
Filesize
7KB
MD51e52cba254130a704088c67e6b50f3b1
SHA1a88bccc499f12e27ad786bb34ba0d4e60a6f1ef1
SHA2561a501a043150c2e3f1aa12a02b214b962d385d6e0b7e81ab9202928e3c1b434b
SHA5129f371fa9de29a3cc8f930a2deee7d29ae4668e13ab6d912a8b5acaffb5f566a48dc93bb76ee81e870ef37af60450d30d47c615b1a35f205c7a8b3c70dc3c42d1
-
Filesize
6KB
MD566810527ed2554a95cdeb889f4748908
SHA14cb1cfb130bbe3115431ae5171dec5c6323a7eec
SHA2560e6f088b93d4521bae925d380b09de766c35d4339ab37d354f2c5e993534ef21
SHA512c18899a486dd7d38a739b02b79e9d077c3b19ebbab99956ee31ad5a91c98669499e832d43c8b36b0f269272af52f2f0a6a9486a0360dfb86174844292149093f
-
Filesize
6KB
MD54a2bccc435d6d328eb2c4ed0b05d2a78
SHA162c4088f1312bca06a23c7eb9f77a9989e1f4da8
SHA2561c0039661544d192d7b8eea0fbda56bc0f2664622e0b585e9dce654a3cd70f73
SHA512ff7559dcb71d92a3bc8ab3d870a8ee9c6932380af9d760a2e3f8c84e6ad3ab9735191c24e53574099dacdf1051f999f9a7e2f11bf0dfaa66455da44b05e8089c
-
Filesize
7KB
MD5e7d7e1c95efa20bdfe4a1932c934053f
SHA141e0b01dbd248d678dd05fff83e57a26311aa806
SHA256f4e33f8edb3e29ee1fba86535fb1f2f299ef25d5c386c89c0c73015646e0983c
SHA512555114dec1042182dc829426d957cb51a771bd08017a25d85ebfac7be9a8d8224221d4023b60892acba6a0243867530e0e48013b2e00490cd1258a0bd8a2b295
-
Filesize
7KB
MD5fc7ece06c877496d341ade21b2183911
SHA1cd98ee56a9894c997471cc3d44c824755e2edd34
SHA256f516b26c827fe90b53a619f7ca25000c8e8eda32e5cbd3dfc721c10815cbf097
SHA51214272b76684fecf757809da3ea1e769bab425982236b9c1bd3808494b9c610f4bea2824a09ba16528fd91dfd1a104efd6270e19f9284e906c394cfda22dbde3e
-
Filesize
6KB
MD5bfb646fd691d4ff0187155210d4b3423
SHA1facadd819099f0379fa9784df9e83999ff23fa9a
SHA25685f9036ef071a391548673ec934387a62c5ec3bdc1bae2f0194be934b2c9afd9
SHA512fff6278065bde5cfa302c3e74019f9e437cd60f3edf8fa8cf7a566a3c8079c79b9962d16ca8dc9a2416c7f5ad124ff9f582a432b9d8c58bd4cb113e8577b9033
-
Filesize
6KB
MD58b40fd266a0ade6c4abfc4b49967c1aa
SHA1fbaefce0339c55ca53600ed460d0fd958086bc47
SHA2562b38a3cf71d7e6bc49f355bd324741ef0e5fc6e452cf17757419ff5a908f705b
SHA5123e93ddb05c1599e711316a423e777aa429cca0954bb57423d6ab549c8ebd5210feee39549aa3715261b3d948b1860f2e9eb183a0f503014a94473f06c307eb90
-
Filesize
706B
MD52c002d0bbaeb57993a192b1bbdc32e3d
SHA1d06f188c4bb53829b7e5b01c6adead3a71c61321
SHA256c183ded433556c6ca6211f7f5d555cac7aac2e2229839bba3ec983a4193d1e8a
SHA5127810c1f5086528b5da67f69de1e65aa5833b493b3c8118a5312799cead6e6fff5e295e866747840ca85edc654095afa47a356375d3c66ea999b99facfe9cd662
-
Filesize
1KB
MD5c3f059a8b9efbd2df7123b7ab5a9523d
SHA1acef98905f4b6cc429711878c11adb864047c5b7
SHA25635fe22c3c99f76c72c377ad6e285c926b9deecd05bae1394fa5cd443e088a3cb
SHA5128438e5263e29639c36460551ab35d19ecf608341b52a5b5e592099a0b990d28b75e2ef7dd2c49949da9a1ebafeb8a0f5d46addf3286842877ce7b3517b09e1f1
-
Filesize
204B
MD5b2ae1a383886c32f0f24a351e901ef2c
SHA12f81aaa47fa8ffe86fb56e0fc40179efe9d2ca61
SHA256b201d95f03f3be7d8bae5e3817cd8ee1015661b46e375eb6ebdd4491e54b48a9
SHA51227d19ac0f6bb9aa52eaa4502d9c439cef82c33223675b9f1a8853740616c75b811ce96c7e2d68327285a56e505d637aa24e348078d53982eed74707eef02a5de
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57d53fd499881b9836f5a5a107f7b07af
SHA1d2b64757a9c684b13a4fc7823a76cc8676171577
SHA256c9a6c50ed54108df740a0145fe59d06a6d8f03701be0d26c43bce9fa7dfd88e4
SHA5123c3ac392f43a2389e902ca770491fc99e23aa452ff2601f2478740c49d2a8ec0da20f286e1ed716e1cfa6a06162f32944d75560f24e44d7e1f6407da19294e83
-
Filesize
12KB
MD51953a49cc6c6278ee2e2a43d08e65e4e
SHA16d2f142ca595c62be0292b2b79aa5aeb6fb44186
SHA2567cd3517b838ffd22a76f0e90e21045c89717bcde022425f94a85521d2d564295
SHA512557d5f4fb7023cce9fa99dd57e909e75c62155f6a5851782012114f80d7d584c10f6ba07bba313d724dd1a134217bde952630c3d776bd056e5b71d533d4fc089