Analysis
-
max time kernel
70s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 11:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fmoviesz.to/home
Resource
win10v2004-20240802-en
General
-
Target
https://fmoviesz.to/home
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{DFEFDC37-D4C6-40E5-9A63-F3D7E203D793} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 2176 msedge.exe 2176 msedge.exe 2968 identity_helper.exe 2968 identity_helper.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4688 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1724 2176 msedge.exe 84 PID 2176 wrote to memory of 1724 2176 msedge.exe 84 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4836 2176 msedge.exe 86 PID 2176 wrote to memory of 4072 2176 msedge.exe 87 PID 2176 wrote to memory of 4072 2176 msedge.exe 87 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88 PID 2176 wrote to memory of 1972 2176 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fmoviesz.to/home1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe26cb46f8,0x7ffe26cb4708,0x7ffe26cb47182⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2836 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:12⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7000 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16708997116317819627,10606743130681254109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
45KB
MD5f95a0faf6629fe55dba24478808491ac
SHA1c91fbfa760c6642f522038a7e90b9445cf8c762f
SHA2563401a6c618e31c817b75f603ff2ecfd83b8b75e4309aa09007cad5e98878f1f9
SHA51206f2e5329db17deb104bd106cfc84ea2b321a4ddf64d6d4acf37462cc0d898530b3d913f2c48c7cc29063bb22430e9d12ebd6c9f8e32a2e980cd985a40923673
-
Filesize
76KB
MD551567016feafe67b1911233a8295e00b
SHA143807ddd13181004e1fe5b3475a176c86f2a2f93
SHA2560b6ae66a277884dbf525ca307b7d7645fa328e87baa3b28dd32d537f1cc32e0c
SHA51295dbc5b1ed905837c4d3ee5713a4b4c43a04a6707975a0be7868b1a7fa56653a8576719b1a3340258678bf298e4857ed0e68bb4ae5ef9b25d97b318a255e5889
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
91KB
MD51ae33d0a27aefeae3f7c5a01a998d2ec
SHA19d73db5957201ff3ae316e273783d5efd5b84059
SHA256baea77a06384dbac033bb927d2df0eb248df3c508c6f7bca471bd531463b0a8a
SHA51255716ec85e4c5608d1d9d8e63c5d926195c7ebd6e9f63a67d7a151f59311a5bc42346945f2d3befd7f12994fd1b1fa80e4a1dad9679d682ff3be53f3ffad3fe4
-
Filesize
5KB
MD5aadcade108acbdb07bc72ee17ba7a807
SHA18f0ccf60c4fdee492fe4a22caf1d66f04e114ca8
SHA2567ef8def6fcc692c64dba62d9061b05a73bcf3c407776e2c9a00d461bc1aaf60f
SHA5124b70c0dfa3a72ce935ebf12c002642b28f69a4482d5d0a6492fcce436bc3e7bf020b632d53e4181fc58c76b4275e36bcfd60b4f99c1cc62348a7f171753dbca5
-
Filesize
7KB
MD556b57087944491fdaa3e5ae6f18054f7
SHA116b499d07a0ec38ff08044c1aeba5f58c2cb60d8
SHA25646a518a39be70a30343d64b636851101b7eb0409cf8b25f1b8b1087e3f2c3af3
SHA5125e8db3ecbf3e419c28d55ba05bf4544f0fe4195aa5a0bd579c9ee309faa2e9a50a1e238dd9bdcaaa774f6447ad30d3f03eadb326ffc79c562cdbc04daee7615c
-
Filesize
7KB
MD517c802fc3e731106f21d3c5f3035fa48
SHA12ef0a1015966ad7b9987dfbb390ee530a7016b72
SHA25606f62946fea8704d308923f63f7b65035e71ae8cf635168f52ae5f378421197d
SHA5122fad00204bc728afa25c7a37a0efbe064acb65031b39507c0027e322c3269e22ed6cf10549cb81590e0397b451b33c60be1d2e5ba4acd3d18d2e69d42cebd338
-
Filesize
6KB
MD5a425607a4295ce66c993e75955fe010d
SHA14acd1f406f38cac7d0304cef26ac9fe929e95f51
SHA25655d1be400cfeca628fe0fdacba6ca82aff6086bc8cf59162be8234b001e24c7f
SHA5126f77f1c3a50fa9ffde4f3d57ac1e96abf4056604e39a2150755815d11cb522f25d3577c12223df321579e57c6b789efd1891c4c36ecc6f50c4b871137ef8b7a9
-
Filesize
2KB
MD5027d329ab8b05f3e05dcc287a07e4b09
SHA16e4218bed43ed68e7133b62ea6dc2d23389b26ac
SHA256ddb8906041a0f4f185c35263f5f236b4167d483c068f606d5d4243b0b79e22b0
SHA512fe52dbbb2d0867c299e8a6ff63e124eaa1eec14be75939e2c1a1f97d66ebcf1666d0efe99bcce5b73752427b5b0eefc0aa422585e3e18cbb06aae6ea6897c8f3
-
Filesize
2KB
MD53cb443cdb80c9e69975b86d9706abbc6
SHA1a5c60f3ccfa91d2debd9c666adb2618a2112e6b5
SHA256982872c40452d348fd8a160843e30ef7f87c95ff0c91ee0494b0b0a80b1e5e9f
SHA512b73a0460ca76c6588b854ba883d3d4546bce9514ecdc4d9573bdd88c7d8f10d9d6c77210267e8cccba6434275575ab62ebb16833985d183d1d1f5dc87c8cdcdd
-
Filesize
2KB
MD5862a994f332622017dd103e81f5789c2
SHA1934fc3dec7568b368992a8b3450aa8442dc5bb1b
SHA2560a7f0dd4a0ad01193122fac466dc59182def49c2822c2647f91d991525b66e98
SHA512ad570e65bfe87e995f4f5cba8ea62f32040a253bf492ce252b9feac0476d89a89dde879b40d8d6654424cbc4ed1ce623aedad5f5c01e39e252bada052c8d3c6c
-
Filesize
2KB
MD55306b2ac3da113e5bd67042f652609cb
SHA17d892c6ea7d31a855fbecddd9111e7dd6d83e358
SHA2568668cef59387004adff5d194cd07bfad2eb60820651ee01803f451a8bb31102e
SHA512ece10426dae4447b09a95ef5612cb1564c9d6e928bcadfee762f473feb8e56acb82ec07c5bc7b604f0e42728c7c4cfb9111db0938ac8e68971ddd58eb9c7a50c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD567a2683fd9cc47a2b1bae49887d9ffc5
SHA1c1df4622309da5ddf082da5ec0937e2cfda64ede
SHA25616933530e2c669beae0e9d9e5d9129e972e3de41aeadbe265ffcfb9cb751d827
SHA512848312636c7ab1e089d7a39ad253d8f05d2b681bc6a2eb16b1535dace9e0b645b53e29b11fa3982038e3bccf3247f58bf77301cc6fccc0e659f7fef9a2c80bc8
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84