Resubmissions
14/10/2024, 23:59
241014-31wv7axakn 8Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/10/2024, 23:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sourceforge.net/projects/fastclicker/files/latest/download
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://sourceforge.net/projects/fastclicker/files/latest/download
Resource
win11-20241007-en
General
-
Target
https://sourceforge.net/projects/fastclicker/files/latest/download
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2464 FastClicker.exe -
Probable phishing domain 1 TTPs 1 IoCs
description flow ioc stream HTTP URL 6 https://sourceforge.net/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8d2b861dc923d16c 3 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\FastClicker.exe:Zone.Identifier msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FastClicker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\FastClicker.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 72615.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3804 msedge.exe 3804 msedge.exe 1196 msedge.exe 1196 msedge.exe 1928 msedge.exe 1928 msedge.exe 4928 identity_helper.exe 4928 identity_helper.exe 3236 msedge.exe 3236 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1824 1196 msedge.exe 80 PID 1196 wrote to memory of 1824 1196 msedge.exe 80 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3988 1196 msedge.exe 82 PID 1196 wrote to memory of 3804 1196 msedge.exe 83 PID 1196 wrote to memory of 3804 1196 msedge.exe 83 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84 PID 1196 wrote to memory of 4476 1196 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sourceforge.net/projects/fastclicker/files/latest/download1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe5a9e3cb8,0x7ffe5a9e3cc8,0x7ffe5a9e3cd82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2576 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6496 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7004 /prefetch:82⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6760 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Users\Admin\Downloads\FastClicker.exe"C:\Users\Admin\Downloads\FastClicker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7208 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7332 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1172 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7128 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7388 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7356 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7412 /prefetch:12⤵PID:200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7952 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1908,17658768339648301627,9015036315458232341,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7560 /prefetch:82⤵PID:1716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004C01⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
Filesize
20KB
MD52e5e9c1a2fee624e54e5b587d3171ba1
SHA16cd4cebbad91160cabe6decf75ed95c201efba74
SHA256902c6abd03c47ad692fb87a6abf5e435cd5414dbce04b09fe7cae57f678b9502
SHA51276c3b74c4060c406b155ff04c4328caccc641fb209f5c78e00107d8c0c0bc2c436889c08fe6ef54120583625d0c6499fa432662f8d34f85b181a27840c4415e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD5957a6f478511d3d90935c23cb6b503db
SHA1ecdcb84f709816ff5be88e21126bb6ba9eeca453
SHA256d312fcfe4c30f287b856a5cfa76b8869962e8ef6fa4a2776b1ed1ecfe35a7a1e
SHA512386295a4177d72edf58813cda043975821f359e39f3c83af7d4207d161cb8b9ed7b06e82812f7c5f50b26a0e0bb22d155d9ef8345555b904de7ecc862a125939
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD584f786b40f038cf5a6d826b553260ce7
SHA1cb330f70249787885b954e7c6d1122ecbfb7edb3
SHA256bc394adbe06bdef1b814ab68132c15f9defae0f7e95f8bcedb3bffc828f38351
SHA5128884d97d7c8173ed08ceca0210941a4abc3087343a65b9e175124c0a9549271f2389949f031a072a3209877ac8510474fc818d88b7031a982865af5bcb1cd678
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD56bf56edd7a5e2ad01a173c73d77ae29d
SHA13974f58950c35c608a4a7c2070ce513cb4f44291
SHA2564ceef37c87d666a66d9bb896188fccb974d31633c51543c90553599e63fce756
SHA512f7ea9a2b1c1b85ac42f2e9ac827cdaef529077e4bdcd46b5b126aeb453d83804bc227b5b16e7a56384d4911f9f5b7c574685395d07d16a0fb4dcfb4d8e3ee68a
-
Filesize
484B
MD53776c70733dfdb43f7c6f6ea0edc5435
SHA14ed4070972912672d420fade9b6781de8244c009
SHA256adb455431c3ef9ccd77a9e9eea126c299d2e4081ef1bbb5dff5f2755b456c11b
SHA512acfafe3e7d296a1ff4e61a9a6d0b1297551ae72a277c66012a8c57161206029603654541ffdcfaa7b9103a2188e22d0a7fd98d6524a657dcc5f5258e20f3335c
-
Filesize
2KB
MD5d991252fe688176e38cf25dcf6633963
SHA1ee08b35b61ae5336140a7a17ff1d5428c6eea8b9
SHA256462791ccbcf97f151d116c16e85c233b37543f1da685212b8e8ad93b14a1fa2f
SHA512aeee143d6b716d6f4a5b37027fa2568c67e8f5ddc322bb556eca592a96aaf4e575a4ea52d19f207661b75d37e259f51384685f513c383208a0235e9b4942a904
-
Filesize
5KB
MD5de85bbde02b5c716a80e245ac4a89049
SHA15412fca68f7d7c4a41d932d9a76c86aadb9e56d7
SHA256aaf846951d58241bfbd73aa2692172fd9bfbb7e26f8a97fe08a062cf735a6da9
SHA512009354dbe19f87a513633c5e96aa5907180748de7d6fa83b51069e996e07954216a067a49342565f96da7dbc04ead24c96f30616e9559c3462a367a0ca0a2f8a
-
Filesize
6KB
MD5e5d0d01d781838c5600bacf3ba4b257f
SHA110d40e969879d63b0c5983a1663aa3f57e2cfcfd
SHA256b0b75000228c03d46de1b23ca4c472bace774ba8012db590a6a30e1e1013243a
SHA5124d6ca33616e8e7a6f8a93dc59b734e93a47924c328941ef8220173dcec59cff31dbf71807d31f50d77319817e2cbeb3342809cefcbc95197942133fd3b40e6e6
-
Filesize
8KB
MD5f23ad91a1e19a4aff84ff5c6663b67e2
SHA1b66c12a87b19497fc15bfe37acd01db4f7d66e23
SHA25687201437448fff0eaed07a455d2911ddd9bcf2aecd3e83801dda5d3b6dc8395e
SHA5123cf683465477827a145bec648ebf09a93b404d8721477938b22fae4735c829809380dc7f34723507029dfdbd9690eed885b2961634edd7856332c4bec0b1bff3
-
Filesize
7KB
MD5231f7610f98723665754390b5aebd439
SHA17047ceb0e1ca8b5f9ca7518b7b9a343f138f2a9b
SHA2564feb81f0c0d38f5738f8678b7f794b7c9a4db90ed07b3d215b447d0b1cc0a52b
SHA5123c414854f5c4b3d5c64a279dd3e36a06d5694c8c6c22d78a1cd282a3de45911006ee56dfbefa4f247c1008c40dcff88b300b18dcf62c9afe141e1ca2302e74e0
-
Filesize
535B
MD54244eb81dae2ed3f8ce92500f2c47c10
SHA1cc3a9bd1bb34b7ec13a910fed12f9b2564de0860
SHA256c5f32acabd1a703916830f20e691d30000a0d18e87ee6ba3fd65d7c46d840fa6
SHA512e6e21c88aad2466d73f0619a6645bde54c4284277feda625697ec67b51ad1a7d41044b44a1f9da54bfc3f813b4ec96707e9843cd5c7ac08149b68f10ad20ab17
-
Filesize
1KB
MD5b0879a7f7f6e5ae617a49fded27edd6c
SHA1dc0b264e6a50c682b67807a2984f93d4e139e825
SHA2563858dcdec2af23f06d5cc3e348523b49218a4c608e731812385849df3271b3ac
SHA512662fba73c9a103303ad1f986afb729120bb95f483f367ae99762d4eb84caef5cf97eb1255f76c69219eaa6a217ed93d2a88fa352a0ef82cef072d17c53c8538a
-
Filesize
2KB
MD52254c09d071bcc31ecd37900edb12878
SHA17f6ee5f0e96f36ba256fe91dfe0494472a804bbf
SHA25640c8f20447eebee4a854f469475b29059438cd15ac13b07d805e971b9ceef12f
SHA512bad7cad90cee26069b6a327ec3799370deca64c44887102d9b7cf816e0823e5976a8473ed021e1535b32113b2cb5eada8ddc09a93543bcadc5144c3af6185758
-
Filesize
535B
MD5438fb501bc2b8bdfe948ea61677048e6
SHA1d080c1d1dc7de4feee19ca75940752e5c7b45b06
SHA256e4d5695458b797718b56268a4c34db4b3e091236bba99d746a681b103ec7ddef
SHA5125dc4fe1132d6b40abfc41ef940e116f5be7fa27e8d107528290b34c558b24e616c2fca223e9376415e224397fdd54d015fd906296f698e5606d90050a2c9d1a2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d734190eb17645c41491a9ca9189300c
SHA1272b38e83cf670b9889d2a1c8b67eac5d8cd8b47
SHA256c28c27769172aa133534bb63345b931eb3b590f60b02a016bae10a0502e38082
SHA5122638110a0145969c4410c766a0a198c0c994faf237c6337c2d739647559f2930a1cbb0bda7722ecb25a176e10a53778b59aecff18477fb0662e94cf56f7af486
-
Filesize
10KB
MD571064b33e3c9c821a7ecfe1ea07f38a3
SHA10231576b10d0970df0751dd6933d185a2d24cb3e
SHA256dd1408e6b9f68535ee3f9d7274dc854090008de1ac83c4528b5aea514067c736
SHA51292b1a1ab84cf8a62837518bea341a953d026d3efaa85ec3de0042be66ee1db48bc783589d09e2729fb2a395f98ab26d4747da4b891b8696294db192928889f6a
-
Filesize
11KB
MD553dc5ddb69eb7ab5055ceedc3f5da944
SHA1b5bce1466cae66d725b1fbf41b4c18a8224dc268
SHA2566169f10b3aface7b9bdae673318275f291116fa621250bf2ff3ac0e30e4b173d
SHA512ae8aee7410e626e7bcae70605e88e2a0def59f1cd3022502fd93e07c2516baad983ddc5349c1cc8d6cb616808716ecd1ade52f6efdd95cd823135146a6d02a49
-
Filesize
154B
MD58e7521c38ca171163383b59e3cc790d6
SHA1f2a19b9ff0a961c5007c8b9439e0b01cc24a30b4
SHA256678aa684de2370c95f6ff6ebb03cbe73e7f7d697025fcaea438e45acd177a881
SHA51234e409b0a062cf82e2f5f61699091e9dffe4fb25a93d8461d61803356f1b9350a14e143bb4cf4538b06ab130887ec482bc88be6bec600b95a1a06b717e18e247
-
Filesize
17KB
MD5e787763e761b600730c38b3c47d62f2b
SHA1f1127b79126a3bc7d80be8a55c412b005497f944
SHA25676bbd8b86fb0059e43aa2b1a809071ecbb9e65c409ba06bd0d147ee5196ee0b4
SHA5125041d5ee7b082612b9f8adf3636f4c137c2d70728a8a831bbdb14063007a85e95e8ca8d3118980442640e34c5ee72d03c19f7db96b218a91b6f250bc5c56a7fc