Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
2cc4d1825584e90e6dfbceaedee5d450N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2cc4d1825584e90e6dfbceaedee5d450N.exe
Resource
win10v2004-20240802-en
General
-
Target
2cc4d1825584e90e6dfbceaedee5d450N.exe
-
Size
705KB
-
MD5
2cc4d1825584e90e6dfbceaedee5d450
-
SHA1
e37290a27f1d9f6b49ef024af302af489a45ef97
-
SHA256
72a8e2f336a2931d4c9379838f0de1074a5df3f7218aa6a96386879a474e9637
-
SHA512
79855ee02291fbed4a50ba9ff0840bf2332a5b8088b63017517123cd20de7b18778b64b5c88260a29983f960337a2c729430ef8eb4083602caa1c7497fc24e2f
-
SSDEEP
12288:3SkaRYF9CDA9JsSSXKcAVODbuyfaCQmKo0A3eqfAm0ECPRAPkYFY/Gl:3SkaR4UDA9Js96cAqZfa644e/REqfYFv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 2cc4d1825584e90e6dfbceaedee5d450N.exe -
Executes dropped EXE 1 IoCs
pid Process 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\daydaybuy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2cc4d1825584e90e6dfbceaedee5d450N.exe restart" 2cc4d1825584e90e6dfbceaedee5d450N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cc4d1825584e90e6dfbceaedee5d450N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language copy2cc4d1825584e90e6dfbceaedee5d450N.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2cc4d1825584e90e6dfbceaedee5d450N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe 4376 copy2cc4d1825584e90e6dfbceaedee5d450N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4376 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 87 PID 3208 wrote to memory of 4376 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 87 PID 3208 wrote to memory of 4376 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 87 PID 3208 wrote to memory of 4412 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 88 PID 3208 wrote to memory of 4412 3208 2cc4d1825584e90e6dfbceaedee5d450N.exe 88 PID 4412 wrote to memory of 4584 4412 msedge.exe 89 PID 4412 wrote to memory of 4584 4412 msedge.exe 89 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 1956 4412 msedge.exe 90 PID 4412 wrote to memory of 2804 4412 msedge.exe 91 PID 4412 wrote to memory of 2804 4412 msedge.exe 91 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92 PID 4412 wrote to memory of 1232 4412 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cc4d1825584e90e6dfbceaedee5d450N.exe"C:\Users\Admin\AppData\Local\Temp\2cc4d1825584e90e6dfbceaedee5d450N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\copy2cc4d1825584e90e6dfbceaedee5d450N.exe"C:\Users\Admin\AppData\Local\Temp\copy2cc4d1825584e90e6dfbceaedee5d450N.exe" C:\Users\Admin\AppData\Local\Temp\copy2cc4d1825584e90e6dfbceaedee5d450N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://jc.110160.com/ad.htm2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbde846f8,0x7ffdbde84708,0x7ffdbde847183⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:23⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:33⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:83⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:13⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:13⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:13⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:83⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:83⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:13⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:13⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:13⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:13⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1344 /prefetch:13⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13484175586804473966,10351256586799716904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:13⤵PID:5860
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
5KB
MD5b6f1d1de34778efc14c76f3ed18315ae
SHA1160024bba373273b876656d045cd6411fb873fe5
SHA256dfea87eba0ad1482059950054848ce0bf699e008998d628d77557a18dbd50f81
SHA5128d24730f030afa7656923501d9e9c1c6ebd1750ff0459cbc85bb3413ad434e7f0226d932671f37e75f5440fc051ea0ac17f8cc0d7c0103db4191362b34e05b4f
-
Filesize
6KB
MD500c7d5d91a4dd438a0b1175101b180c0
SHA1da591435d2358ad9f0873fa8c7b2df90cbae6e76
SHA2560ae352d609d94e135c1f64aaacf8b96b7074f717c59bf0124dbc80ee95b5bbae
SHA5129452b167d13cf97c20e19c7199acac7fa2170794d33f3a427420de0fb3042f8a422830208b20d7615a14ad1f051473148d9f057f544ae7b81dbd2ca820604713
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a40c5eeb965272f79ac1ab2889fff5af
SHA1fc5acdaf42cc4e2ea0a711f6054683930657b2da
SHA256cfd34fda7b57de67d2569ab6ed0c6e4924ea14d76db2f60e2875dd28950efd55
SHA5124893edb5f3096671fceda49684000803e38a25a7f611c1979d0ca4a627dd0b2f5b425fb8ca1841bd5e3f75be69e42c8cd3f8e5aa971d01792e27ac1a0c3dc195
-
Filesize
705KB
MD52cc4d1825584e90e6dfbceaedee5d450
SHA1e37290a27f1d9f6b49ef024af302af489a45ef97
SHA25672a8e2f336a2931d4c9379838f0de1074a5df3f7218aa6a96386879a474e9637
SHA51279855ee02291fbed4a50ba9ff0840bf2332a5b8088b63017517123cd20de7b18778b64b5c88260a29983f960337a2c729430ef8eb4083602caa1c7497fc24e2f