Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
takemichi.html
Resource
win10v2004-20240802-en
General
-
Target
takemichi.html
-
Size
375KB
-
MD5
f2df6f524a542aa130e13e9d46d03b49
-
SHA1
3454c9b55ee96a6dc5c5693506a9a42e16634b9a
-
SHA256
f662a5d9933a38c1e8587e10d8bef5095b0002635387de99ae1a1d811efa1d6d
-
SHA512
53c10efff8949b1cc950fafb16511d384c3702a688e1df471f498a2f7c3b29e737868cfa631b30c05b56f42943e068dc18afa261174fa6b92cde98249102b7c9
-
SSDEEP
3072:H6j6I6FssQalBQX5O1k2zOoGFsiUvRf3ssKfcDBlHTIzTAyQu6V41wLXmEmMWF8B:x/DfPMu412mEmU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-786284298-625481688-3210388970-1000\{FFB12E8F-62CF-4D69-B546-135CF47B75EC} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4572 msedge.exe 4572 msedge.exe 1664 identity_helper.exe 1664 identity_helper.exe 1588 msedge.exe 1588 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4916 4572 msedge.exe 83 PID 4572 wrote to memory of 4916 4572 msedge.exe 83 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 916 4572 msedge.exe 84 PID 4572 wrote to memory of 4576 4572 msedge.exe 85 PID 4572 wrote to memory of 4576 4572 msedge.exe 85 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86 PID 4572 wrote to memory of 1120 4572 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\takemichi.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaadc546f8,0x7ffaadc54708,0x7ffaadc547182⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6632 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14114436328712552620,11749063363499969899,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
70KB
MD54058c842c36317dcd384b6c2deaa8b95
SHA11085ddb12b29b79ffe51937ba9cd1957e5e229b4
SHA2560e562969cad63d217848a5080273d1745dc4277d210b68a769c822f2fbfd75f6
SHA512435a67024811360b12339e3916945b0639e2d9319e9d540b73e093848a467b030e91e01917b7fb804eb756dabce2fe53c2d7ea586554ee6cfee70e652a85924a
-
Filesize
41KB
MD59101760b0ce60082c6a23685b9752676
SHA10aa9ef19527562f1f7de1a8918559b6e83208245
SHA25671e4b25e3f86e9e98d4e5ce316842dbf00f7950aad67050b85934b6b5fdfcca5
SHA512cfa1dc3af7636d49401102181c910536e7e381975592db25ab8b3232bc2f98a4e530bb7457d05cbff449682072ed74a8b65c196d31acb59b9904031025da4af4
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
84KB
MD574e33b4b54f4d1f3da06ab47c5936a13
SHA16e5976d593b6ee3dca3c4dbbb90071b76e1cd85c
SHA256535fc48679c38decd459ad656bdd6914e539754265244d0cc7b1da6bddf3e287
SHA51279218e8ee50484af968480ff9b211815c97c3f3035414e685aa5d15d9b4152682d87b66202339f212bf3b463a074bf7a4431107b50303f28e2eb4b17843991c2
-
Filesize
38KB
MD5bff21faca239119a0a3b3cf74ea079c6
SHA160a40c7e60425efe81e08f44731e42b4914e8ddf
SHA2568ea48b2ac756062818bd4ee2d289b88d0d62dc42a36cb6eee5bdd2ff347816c7
SHA512f9e5baefacae0cdb7b9c93afc43ad6ec3902b28c0cdf569e1a7013f4e5c8dfb7b389b5e2bc724b4ddfe554437320f4f2cc648642944c6f48ad2a78815acd9658
-
Filesize
1.2MB
MD5c764a116bb5f3b348177ed1b293a515f
SHA110bdbd5398f0e8bb180bc2773a778345529a0a85
SHA25663cea794b8bda830d5c18a6ced98cd2ae4f6b27be723af8de0b3fd30bc56e5ba
SHA512b33bc90182b1b40163abe370a4da6fb81a169bf11a2235c46d350a66afd0daff29a1e6959dbaf9fb969f4d32bbfd2de5ee084e6f8b8f3d3c175b6d3058306585
-
Filesize
18KB
MD59547c872a043e3eaa976c0ea99e1fabb
SHA168601aabc93f2bf2ebcfb7d4a4c4c35b8e0d1baf
SHA256f4f4835dde56b3e73e0e0181c2d2889ab44a62fc571732ef3f4ba7870dc7d85a
SHA512668847b06b3ac74135f504f32400a9d421ab52931d345c23ea5ce017a7066e4026b00b1b0e01c120eb03f3483a715903655eb589a000c58b461b15cfeae78df2
-
Filesize
21KB
MD53669e98b2ae9734d101d572190d0c90d
SHA15e36898bebc6b11d8e985173fd8b401dc1820852
SHA2567061caa61b21e5e5c1419ae0dc8299142ba89c8169a2bd968b6de34a564f888a
SHA5120c5f0190b0df4939c2555ec7053a24f5dae388a0936140d68ed720a70542b40aaf65c882f43eb1878704bea3bd18934de4b1aac57a92f89bbb4c67a51b983ae3
-
Filesize
20KB
MD5c1164ab65ff7e42adb16975e59216b06
SHA1ac7204effb50d0b350b1e362778460515f113ecc
SHA256d7928d8f5536d503eb37c541b5ce813941694b71b0eb550250c7e4cbcb1babbb
SHA5121f84a9d9d51ac92e8fb66b54d103986e5c8a1ca03f52a7d8cdf21b77eb9f466568b33821530e80366ce95900b20816e14a767b73043a0019de4a2f1a4ffd1509
-
Filesize
34KB
MD5b63bcace3731e74f6c45002db72b2683
SHA199898168473775a18170adad4d313082da090976
SHA256ea3a8425dcf06dbc9c9be0ccd2eb6381507dd5ac45e2a685b3a9b1b5d289d085
SHA512d62d4dddb7ec61ef82d84f93f6303001ba78d16fd727090c9d8326a86ab270f926b338c8164c2721569485663da88b850c3a6452ccb8b3650c6fa5ce1ce0f140
-
Filesize
16KB
MD59978db669e49523b7adb3af80d561b1b
SHA17eb15d01e2afd057188741fad9ea1719bccc01ea
SHA2564e57f4cf302186300f95c74144cbca9eb756c0a8313ebf32f8aba5c279dd059c
SHA51204b216bd907c70ee2b96e513f7de56481388b577e6ccd67145a48178a605581fab715096cfb75d1bb336e6ad0060701d2a3680e9f38fe31e1573d5965f1e380a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD515a42670690dad417c4aa90b422bda94
SHA1960bbb2da3304657479f2542b0c3355060347068
SHA25647933c14b2f36e2f345a74125e757dacbcc8bfbee5b310731b14fe6113d04133
SHA51254f03bf7045f9d03ac3748d4db2910fe66330c4281257fc2ac565e2082baf65836210e711c70b1550c9459d57a74f860a7a9fe576c38dc9f2f8f1d9f534dc8a4
-
Filesize
1013B
MD537613fa759cf1a63a17d63bca98f3b14
SHA179f2a680cdc41d63824e5fe9fc75e744782cbfc0
SHA2566ce0f753f290d1ceafeb2fd0701f7c6aec7072b49b5180cb280e609172f1d160
SHA512959ad28750d566c5827b34322c2083c62dc02d33c401a45ed39a9b70d44fc1e6ab5a932bd95283b8d039109645236ff30a9961f1be52f2757294d46787bfcc75
-
Filesize
5KB
MD5dda39375c8bc4879094d0ec3fc5b7efb
SHA1c2c25895fd850f8494c500089e60db9ab81ac2f3
SHA256d364e49b63a8c5d69718a5602840ce931a911ac01611214379763677cb620228
SHA51245fbffb17c42d11ef4e05606ab8135f7750f8435dbc7f9131f5103dd2b7a184327452640526100e447134abe1eed88bcc83ba6302a14b960de503bbc1bdaf78d
-
Filesize
6KB
MD513ccd5ea8343dcd00dc7324b555fe5f0
SHA1d0d671eeefa087707ab0c839b4691a06a717f869
SHA256f77b65cabe9aa383b06ba80ec3af1a3d555eb9b8f9059fda38fbd61a30fcef30
SHA512caa0c627c6ba44177ec6aaf752b5c378d88f2c24e4c0220fab03fe60b54db85a99884cfee370b0a9cbe31a6efc40fdc68070559b6021a0f791de0a6ddec4d030
-
Filesize
6KB
MD546eabf8e28067bc54f4b8a5864de5fb2
SHA1472e9dc5be53ad01f40e867850d9ad0b4072fd00
SHA256aef4c76a2e32fcbcbecfc8d85122bdb7fec07651311dbeaa3f182009c73703cc
SHA5121cc181a35acf7a75b73bcc99d376da275b8951fb2980d40d659c7453d4438347270c6268a309978c88ebe6e52ef80a62f201116bf388ab8fdde52f577e7cc954
-
Filesize
7KB
MD5231d0c744a291de0e6b65444f4bdd6b6
SHA1b31d78ea74507bdbc52ded4eb2b99ddf4f5b8020
SHA256f77f1a196fe532636238129a27e0f7c6d88520af6d3d18c13dc3b735f7b06358
SHA512567977bb33758f62e6879fa6f23cbaa9b710360bbdd12b3637c253b8263216193bc63bb168aee8a0670e39841cbbb3913a8dee05175c101622d03cbb6e3f9939
-
Filesize
1KB
MD567036b97a1bd61814b09d8c3117da365
SHA1e3a465408c5322feff38f281c5c839a9a71443bd
SHA256f765673649c92826bfdb7fa406fce0c3f313152695ce4346b0ec89ff2e37e90f
SHA512aa7386fa6ad0dd7860e6a97d4a6f094773e8c3ff390a47dd203e209309d6b27dcd79687216ad748480ff8835946624006d339eed66c8fdb4b598e64082f46f32
-
Filesize
1KB
MD501de5a0025da08d70062c10f90bd1c1a
SHA12d47145f9860c8bb666a42fc056ae8c39309a870
SHA256a50047e1a127c88cded6a9942ecf38d1185f3d4fe4fafe55ac35eab892be0daa
SHA5120858313d86c77ffdb3450631282690557f91d2aa1bcb695d3d3f603867f0c784bfd65a30a24508a7e280015d11686681abc66d11240984f76ac07ddbd3ca7787
-
Filesize
1KB
MD533e31afd90a79affc99ad0e8e6de0499
SHA11df537c889ed7df3b7490a76e443fd535896f781
SHA25607b3b1c10eeaddef517b8e62f86345cb77d37bb2c960a7dc3647db1132d44ab1
SHA51273a3b5c8ac2171eb482ce8d53aacf6d92e00b043abc69bdcb1db6f02eb63ef4747385dedd82e7a8e6a04ddecc179d414ee9c4f04c4122eb02ff7f93ef13b1daa
-
Filesize
1KB
MD561f8becf5919021791eebcc0b39aa582
SHA162e31cbacafc8a839a0f71026fa6301342d1757c
SHA25653ec30e29ca76ea7d773b80eac7c485353faf124154468bf3e4f18b7687040b9
SHA5120f98cf54168effd89a55b659bbd80d7ecb39e8659a5d3be41b242dd0c54f860e98d2d5842a38abef4fcd08e0bf7a0d387c65e3e057e3b7382208fab62122f124
-
Filesize
1KB
MD544b505d0a569b79280375aad47f49389
SHA12a10219a94aa1b2b5209b7a28d4131dba2020514
SHA2562c9ecda3ac7a83ddae21d12a0d3872dc0035603de1816818ff383db9c865d49a
SHA5122732e35896776b0cbcd06c45e876c04177d1c7fc0fd31b7fd7a52534ed3f6c0288a3a2204ebe08ee6fa18841c816a001149c620de0ee725219710434568da404
-
Filesize
1KB
MD57b6b8c1e609e97006c152e04158a7e7e
SHA1d89e2426be2faf42a87dd7c346ea444ccf677129
SHA2568a539fe8f0e19eaa97c1cf5d12deb7bb90205db939f7835d577e7e1bac036dd0
SHA51219142ab285ae545153ea68bc28ca8d73a56dafa51d2bea84330eda0717f09c88d96f4a1f1547148a063ba55f3545374174fbc6303d593ced233d5ef6071b87b0
-
Filesize
706B
MD524c558562e5bd4fec1562bd2ee43a388
SHA184ac563168e95f9ebf8af2782b34e2f4d6f1ce31
SHA256f1eaf54d622c7b7eb960b9d36b2616f8bc55d9cf629f8a592e9b9b77f7840106
SHA512ff8dbb041c3cb17d98ab0d0ba8a0a8a3d449f898c76842069c2860eb3581e68b95bd5839e422b49c58c6d9ff5925b5eae02d62c2cfd10a2f17b1d4c9c23eb6d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bde5a29ba8dd39cbf104cac7935119d6
SHA189c81874b1878503d71972ce9a113e276803ddd3
SHA256b6eddaf3ef5f274a37537fa9b553879dd26f315fa0fce7b35e160976804c6a6a
SHA5129911dd5a37583e6b9e2f703960dc5f13dca43ff33d0180f142fff5e5a82734376747d47bcb67a55c2b33408a15d365eb0887213af9e0e5feaea6fb9620c46162