Analysis
-
max time kernel
430s -
max time network
476s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 13:41
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{A2B307CF-A51E-498A-81D4-142603B9BCAF} msedge.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 555480.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 208046.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 963683.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 535380.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 3964 msedge.exe 3964 msedge.exe 1588 identity_helper.exe 1588 identity_helper.exe 1424 msedge.exe 1424 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 4748 3964 msedge.exe 84 PID 3964 wrote to memory of 4748 3964 msedge.exe 84 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 3320 3964 msedge.exe 85 PID 3964 wrote to memory of 2268 3964 msedge.exe 86 PID 3964 wrote to memory of 2268 3964 msedge.exe 86 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87 PID 3964 wrote to memory of 1372 3964 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1lI-IL0gg8WoRTc-3cazYsUkFjjstyCRX/view1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28ee46f8,0x7ffc28ee4708,0x7ffc28ee47182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 /prefetch:82⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1712 /prefetch:82⤵PID:6064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:12⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6580 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3636 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7068 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2376 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15218545714000658168,9370840009117998859,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\777d8c16-8cd8-4bd6-8a3c-5e5317924a74.tmp
Filesize7KB
MD5130d475c089611527927954f3d1fe2af
SHA15ab5498e25876fb7551e258f0f5a80b2f92d11c2
SHA256d9264ad972cd45cc76ba7f2b645ed0efefc00311b16a6c5a1e5d8cb1bf816f56
SHA51234eca3c56d467f4db9b7cde6fe3d8a315f71ea7f690ff1d5171d77e055d07910d12f6abeaae9907b8220886c48e26f4aa188fbe53223d1587990730b356eb62d
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD53d0186be5d284be868f6eb1a393e7c06
SHA1ec04ec8336f59fc003bf8119740a454ee47977c0
SHA2565abc0ac605ffe2866dd837b001743a8e8e978bbfcfde517ee9d450eae5d56dbe
SHA512e8beda498f687ed636eebdabc8b9070afff141acb5dcc58a25a69ba9b45fe1412b06be6a76d269b76148f810c36f241aa38c70eef892ba7f5a4b4b4bd202012c
-
Filesize
3KB
MD5728340221f41d8765cfbe8c1339e4e70
SHA16882478d60d84f58c1a2265c6902c0e76a9e0151
SHA256f0e9ab170d13c8fa6d09ac47ba198f6fc026d05a30fe77efb44965153c9d4986
SHA5124609f52e026e3a17857acf5972a07247bb93b4141b1359e83ba315087fc28311591f5c9d0be0c1f9bb9007431c9b8618a8d5e685602c16d83e56b64ea2c57f7b
-
Filesize
5KB
MD55995a55d5b427a6300637538dd0b7380
SHA1972c7397fe0e78fb2adcb008284ff7eb5c485ce2
SHA2566a70fb57b80070463783d23245057c06d5c2005cb7841ca6f0f34ce8a5720e18
SHA5121884d925047379bef3ab6a428aae696df25b313df2133da7699a50ab329dc3a55aaee20e4bd5cf23535cc434614297374a12c40a4a134e4b1220b86ca2aa3de6
-
Filesize
7KB
MD5f28333eb710aeb2d3371d19d7dc03363
SHA1a6cf85c2eff43727a5eeea3cbe09bf35181177b8
SHA2561b350d59750294810d029bd06b85a950bda59e74ff994aa34f94f8651da26082
SHA5121291a9dfd05b88cb54d33f74ac0a7f6d6892b8bb600ce35a494a899e322821228fd093265a6cd04415bd2a6fe63f776fb19b85931e900c1a234547aa6fbe997d
-
Filesize
7KB
MD5e53dc1dfc32269c74da445a32310318a
SHA154280c7ce0ab25a69de9811e66fba596df6c888c
SHA25609d3637e467f26894d0c6a0e03b721e98a260ca2053d2f1bd7d07af4aafd5cc6
SHA512fd7ffc9fe647a1aa98dfe8a59e266c7cf55beeea29f0e39e7195e51f54531cff087adbc20eb5f0a2c8cd0a1c2d721f09d5fa0622379129e386212b7d457307a0
-
Filesize
7KB
MD5982d0b6f9786f26444b617ec7878c84d
SHA1b0fc8b21542e97e929193542c1cab99558ed6068
SHA256276ae0412075e59c2a4aefac02a311e2e598936616c51da17ce4f54bb0cea215
SHA51208a85f3300df447f68218743ec934f52379a2439aa2f2b96a63370e8f3e06c3c9fa3fcaa536b84e302c092ce6b8383ea534175c43b0fd26a51627b1f1f5a72e0
-
Filesize
1KB
MD56d8c4b4dfb6a1e9a2cf12141b6ce4b71
SHA160c210df56a7eaa2a367349e51968ec2e29ce98b
SHA256683549639ccb31c781816e6e30f5579aaf1c2e6c14511574c0d815b9085fae3a
SHA5123082ec5ed65f80819b695012864bfd189f7573c5977281995a01874792f41bc5cada4ff321923007797e210c40ffdda5a0fc3c5719c729a0243a00537cda3f06
-
Filesize
1KB
MD5792b4f0029b0da3ba48839ef0d3e0c6b
SHA156dee5e2b465958f9ea874130d66be5c32e536d3
SHA256eb81b0f27ca45a7948ec921bef85891c27bd9e2875698ec3f04bc148c20512f3
SHA512e950de524123cebca062772d590e04f2aa3b9b40a891269f547da818394e2ebb0d13978dada16ad931f797c6177af02da2ca21ed1460ce0ebc2b3d93bc859a1a
-
Filesize
1KB
MD594fe6d3f4165c65149e419fdf7242210
SHA194f185bef502ad5f2cecff39e0025821e96d1996
SHA25697fb8e4b10117b95e4ed69f18fc8c730a34d7d3916c46d8b187a4ab2c4e4aad7
SHA512e93facc5f9d356e5d318b773b9c232341e5bc2c662d8a18dec714fdf9e164602d62dfb4d954d01c0d628092400da083592508a3eefebf7488256bdfaffbcab1f
-
Filesize
1KB
MD523a5cfc7b857478b3820825fcc6a73ba
SHA120d4158e2e1043b0bc4d10fba415f44972227271
SHA25666f363e5e6e7e722b3a7cb582a69da86d36ee6123dd695b7c1e2fbdc03b4b0d2
SHA512a823c1cfff8721585bb35b3bd5e44837f54a2af14a9c5cf358da461efbb615a8060486c3fb3c3cfd56422aa13dc986c152f3737a66d3ca868709d7fa6ac707fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50e27ed13db7003d99dcedec161a0b1d7
SHA188bbc2d7dd5bd4ac34d2309a5c38e264a6730a88
SHA2564976c9915e4fd28a511a489c781e04d2e54ed7c64944268fb442505dd91d5c9a
SHA5120c2aed2bf40a8fea4e8a5107741cded9493580fa62403f58a08b7cc69f107e348c0fe83578a9d5c781b8387da0a42f8d4d5b2c4d53f9568d5f1e373790c2b33e