Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
1947b4931f55d003a5a021b1ffd0eb61.exe
Resource
win10v2004-20241007-en
General
-
Target
1947b4931f55d003a5a021b1ffd0eb61.exe
-
Size
1.3MB
-
MD5
1947b4931f55d003a5a021b1ffd0eb61
-
SHA1
a063a82db284f64d1a9f67fd49102e42a7ef44f7
-
SHA256
6172161109f5b9a4e9f185740e88a6378b18f41121c687455f2dc9be1b86ab01
-
SHA512
bb533ffeaf910c8bc1f38914e3a637142741ee3567125d4a69308038901d640de55cf49a2294287ebde9d2c561eac8fd0fd294f6558fb3b95b4bc4e7e7685635
-
SSDEEP
24576:YyxKh6dc+e3b6xaeTIsKCuGG49DuWvlNnr7knfa2BAU5S04ZQ1ZPX6occ:fM6e+e3Ze8hrGJSWvl97LBv04ZcB/
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
zK2bm57.exeJe4Zp79.exe10ZP42my.exe11XU7943.exepid process 3608 zK2bm57.exe 1116 Je4Zp79.exe 4904 10ZP42my.exe 6648 11XU7943.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
zK2bm57.exeJe4Zp79.exe1947b4931f55d003a5a021b1ffd0eb61.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zK2bm57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Je4Zp79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1947b4931f55d003a5a021b1ffd0eb61.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\10ZP42my.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1947b4931f55d003a5a021b1ffd0eb61.exezK2bm57.exeJe4Zp79.exe10ZP42my.exe11XU7943.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1947b4931f55d003a5a021b1ffd0eb61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zK2bm57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Je4Zp79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10ZP42my.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11XU7943.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 8 IoCs
Processes:
msedge.exemsedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3227495264-2217614367-4027411560-1000\{9772E3BD-4F33-4D28-9D43-1C0E7C833D02} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 2112 msedge.exe 2112 msedge.exe 4332 msedge.exe 4332 msedge.exe 3584 msedge.exe 3584 msedge.exe 4780 msedge.exe 4780 msedge.exe 5452 msedge.exe 5452 msedge.exe 6132 msedge.exe 6132 msedge.exe 6176 msedge.exe 6176 msedge.exe 7988 identity_helper.exe 7988 identity_helper.exe 864 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
Processes:
msedge.exepid process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
Processes:
10ZP42my.exemsedge.exepid process 4904 10ZP42my.exe 4904 10ZP42my.exe 4904 10ZP42my.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4904 10ZP42my.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4904 10ZP42my.exe 4904 10ZP42my.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
10ZP42my.exemsedge.exepid process 4904 10ZP42my.exe 4904 10ZP42my.exe 4904 10ZP42my.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4904 10ZP42my.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4904 10ZP42my.exe 4904 10ZP42my.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1947b4931f55d003a5a021b1ffd0eb61.exezK2bm57.exeJe4Zp79.exe10ZP42my.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exedescription pid process target process PID 3148 wrote to memory of 3608 3148 1947b4931f55d003a5a021b1ffd0eb61.exe zK2bm57.exe PID 3148 wrote to memory of 3608 3148 1947b4931f55d003a5a021b1ffd0eb61.exe zK2bm57.exe PID 3148 wrote to memory of 3608 3148 1947b4931f55d003a5a021b1ffd0eb61.exe zK2bm57.exe PID 3608 wrote to memory of 1116 3608 zK2bm57.exe Je4Zp79.exe PID 3608 wrote to memory of 1116 3608 zK2bm57.exe Je4Zp79.exe PID 3608 wrote to memory of 1116 3608 zK2bm57.exe Je4Zp79.exe PID 1116 wrote to memory of 4904 1116 Je4Zp79.exe 10ZP42my.exe PID 1116 wrote to memory of 4904 1116 Je4Zp79.exe 10ZP42my.exe PID 1116 wrote to memory of 4904 1116 Je4Zp79.exe 10ZP42my.exe PID 4904 wrote to memory of 4780 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 4780 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 3024 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 3024 4904 10ZP42my.exe msedge.exe PID 4780 wrote to memory of 2996 4780 msedge.exe msedge.exe PID 4780 wrote to memory of 2996 4780 msedge.exe msedge.exe PID 3024 wrote to memory of 2512 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2512 3024 msedge.exe msedge.exe PID 4904 wrote to memory of 4176 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 4176 4904 10ZP42my.exe msedge.exe PID 4176 wrote to memory of 3796 4176 msedge.exe msedge.exe PID 4176 wrote to memory of 3796 4176 msedge.exe msedge.exe PID 4904 wrote to memory of 3772 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 3772 4904 10ZP42my.exe msedge.exe PID 3772 wrote to memory of 3312 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 3312 3772 msedge.exe msedge.exe PID 4904 wrote to memory of 4992 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 4992 4904 10ZP42my.exe msedge.exe PID 4992 wrote to memory of 744 4992 msedge.exe msedge.exe PID 4992 wrote to memory of 744 4992 msedge.exe msedge.exe PID 4904 wrote to memory of 1608 4904 10ZP42my.exe msedge.exe PID 4904 wrote to memory of 1608 4904 10ZP42my.exe msedge.exe PID 1608 wrote to memory of 2980 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 2980 1608 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe PID 3024 wrote to memory of 2176 3024 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1947b4931f55d003a5a021b1ffd0eb61.exe"C:\Users\Admin\AppData\Local\Temp\1947b4931f55d003a5a021b1ffd0eb61.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zK2bm57.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zK2bm57.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Je4Zp79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Je4Zp79.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\10ZP42my.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\10ZP42my.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:2996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:26⤵PID:4684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2444 /prefetch:86⤵PID:4588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:16⤵PID:4104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:16⤵PID:2444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:16⤵PID:5404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:16⤵PID:5568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:16⤵PID:5752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4384 /prefetch:16⤵PID:5932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:16⤵PID:5160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:16⤵PID:4708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:16⤵PID:6196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:16⤵PID:6448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:16⤵PID:6464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:16⤵PID:6640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6612 /prefetch:16⤵PID:6780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7100 /prefetch:16⤵PID:6384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:16⤵PID:6264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6668 /prefetch:86⤵PID:6912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=7192 /prefetch:86⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7560 /prefetch:16⤵PID:7044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:16⤵PID:7128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7784 /prefetch:16⤵PID:7452
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:86⤵PID:7612
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:7988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8724 /prefetch:16⤵PID:5204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:16⤵PID:3564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9072 /prefetch:16⤵PID:6664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=6148 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5980 /prefetch:86⤵PID:4584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:16⤵PID:7532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1910135110498406751,5367740604819159870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7660 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:2512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,18216164720246929597,3604582268413709285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:26⤵PID:2176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,18216164720246929597,3604582268413709285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:3796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15161385288506552694,16039787102920174568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:26⤵PID:1552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15161385288506552694,16039787102920174568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login/5⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:3312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,1043018409746297131,9953848368653621178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login5⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,15501040769821430034,8244722469163103524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:6132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform/5⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:2980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login5⤵PID:5432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:5488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin5⤵PID:5360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x178,0x17c,0x180,0x154,0x184,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:5468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵PID:6236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:6268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:6388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc36da46f8,0x7ffc36da4708,0x7ffc36da47186⤵PID:6436
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11XU7943.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11XU7943.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD57d1f5f7b4965f6ec8a3692ada4258188
SHA13b8000fd06d5df4438706c5b146abebad15be130
SHA2568bcc01a804558509e3c7021c01ce2498ede90b51adbcfacfc5c42797fca9bf7c
SHA51263611441f5bba870deda7e58457c25aa50cad9aca8c1a99ec00d6bf57a9ad826c4eb2081a85a375cee3d983866e5680f0be6dc36e7b85931ed6c9dc355f090ec
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
198KB
MD5d8ba6cf174f07b78f9f0dd9a0f00af94
SHA16a4eb4fa9f253315ea15609e3a865e631073a7c8
SHA256d9f6cf609eca4784ea8cbe1a7af7338fb0ba14e0a5fa3fd4599a5defaa7e8d8a
SHA512298c37bed03d182f66bfb25aafdc81ab850ca117c43988475876f1ef99cf0b24621472c1d2f9c296b83c994fc05861e3fe8b12428563a2f20b54b4402ae8b6c8
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
5KB
MD590f860685486db8c52f644aaac030640
SHA14b6029db82c2a26f6a27d5a3ce0c4c4e0a6da0de
SHA256e9d3b50b00ab80ed9ba7a45aa3361b52b2cbcd3420cde328aa5bc776db3fbc21
SHA512a7492a26d6e549e7f3d7e40b86ebef8febc57ec21846f3e6952dfcfeb044d9ba7d7a2a025555d19aab24c8eba4a2b3b267c3435d548ce56d8f936d2c89b01848
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_x.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD52036d51fb0d04ce96726acdcd2b6cfd7
SHA1c649ccc128d1dcfe3152f1ff81e2533552dfd28b
SHA256662e44928189d40440cda64dbdcc81f4471f22e5721b2d477148a21634a611c7
SHA5125a8ec391bfa4aeec039f089680fe2b1826d658cbd866581c127b8dc81040a08208da8589f94e16e0376a12f44c9d1b3b5dc0a24d0843a446e89d810cc21ea5df
-
Filesize
4KB
MD555799b98907501d3910c29c0455cec8b
SHA1862cbf1461d4818cb2bdcd1fe5bddd64c18737e2
SHA25623d8334310b722545de2d1a80b6a32e2a1c1a14a737ca8aa4f243ace4ea4a40a
SHA51204a9cd06ca8a1b975a66dd68d13de2f65326fec22b51a348c0cea36d79608f86ad11694efb62a12981fb87743b4374cd88bc15fe45f390aab1e5bf76192ab513
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Platform Notifications\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
6KB
MD579692f69dbcf1e5a80832741b8a445e6
SHA1c4019d908591bfca2f0d27786c29e1e9ab6a75f4
SHA2560f419d08c602c7103f48e3ba798b27f136bcf4de69ed9eba846a4c2a10da8b61
SHA51237a5b69959160aca0178f72675e2e2dccf97bf8a457d197ab9a89b1d12e3794ca2a521f2c15f2da1591c81a1b53e091f57bd64c97fca2910a1a228d353ccfe6a
-
Filesize
9KB
MD5f1350d0a8debdc7c005aa89f28acac87
SHA117f0a8f676b87ce8fd430ca784b9e45db05986f2
SHA256bc126149ff3d68cd29e359645856b105f1a0004cf8f4c6d5b2fd9603a7e08e2b
SHA5120ea05fd66118e3fc3e47bcb76560274370b5dbbcace69477f6fefdd5b3b25c3af051f430e032f0a77b095e0b93c36fe12dc585564d486f2f830e88e9fc814ef2
-
Filesize
10KB
MD554b1fe08e095c658b89f7bdbbc1ad696
SHA1cde862f7898bc2fb6c79d087fcb682d54b6ce069
SHA25623b0a0ebe19eb41a1863373c3df45640e47759d4a90a7055c528a28b1e347e0f
SHA512af3789e7e78afff81617519d10ddd577afd533ebd32b6061a474ac5ed4928a4d3aab537890fb3b21cb5f211bd72d397b0405af44990fed82344e4e8eac913168
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD59278164724dd905898993e08ca786430
SHA10f95b656900a8790f64e42fad76071f5f176254a
SHA2566ab98d2f0871cb231c217a8ff21c0295aaa5b3623c8aefc847863b2f58805c9b
SHA5126fbfe36a73aa21b2a1c7faf33eccdafde06585fd2989b1ff6d240e8511705920c43791b20101bc9295755fcb45b5c8f726e489b697f9cd3e99d2380c8d838c66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5aba735a1aaa1c7a2787616eefcfd93ad
SHA1959f8d254e890b9225b876798ba3173989301c8b
SHA2561892be65316d5dab16c7d1c164925f6f64503d38fd4863fc35b3f1b1e60809fb
SHA51292eaa736ae1ff2b6db2e378a33afd42caf6da4e2d660f038f708c5bc274b1da1a91e0315a7aafac365abee551928813d4288ab154f53afb1c4f3c731fa91bb8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5274f5fdce5c7742a8264c7ead758bf03
SHA13472cb1595e1021e8870fda4a406fa705eb28d6a
SHA25630357a37e6ca159ff294416d5640671a276b47d25e48228484d76f834c69e747
SHA51273ab14dc4faa4a1a7b978a5ee9d774dfdfbc62213d8830ea3a728d1e8f395de91043fbffd213597a1fed27fef4d8e04ad05f300278a11ac31871b51d082f8636
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5fe6ce159f9d38916c2c9bb361ce08f99
SHA107cf651a7c79c226825f35ccaeacbe6533c28024
SHA25622203dce4454f4c5a3bff98b8c522776d5e91d74dfde714c62b5df79853e7acf
SHA512503f1a3cf7a28cb3b112c769d918c6871680b3ba6c36cb15c5b1916a30063010eb2da4806640ade32048042d7c105e6aa33e25b78699297f249f326bcff27cd8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58996c.TMP
Filesize48B
MD5a6feaaf443a4915be954a89f20fd7d62
SHA12e254ac8e59ba1f489c7525ac68eb7b6ad60eeb7
SHA2565a5eb07d603c35fbb1825368c3819e9833407022b5fd2db43993b94929537c53
SHA51240b63ed07b5c0df264d6ed551e27e8b38c64da7080421c019adf2559ace48e4927ad2b56d3d603f0e31e2fba9b09fdd54dbd363f344906365981c35946a53b27
-
Filesize
4KB
MD5e115e0927b258417320de744f53fa3a3
SHA13f57c31ca34a19df56f8bd0f60300a925bc6715e
SHA25618d7c4e09adb48c8990f22174d6d024f8fde53f8182d7766327363607aa79ce1
SHA51289633d0fcc532c7ef8c4501a32dd3110d4689ed721cb092a8217c348a85bfa63974c9ced2b2ba34d4e94e298d67ab780fb5bae9143dbbbfea0e2ab86d674a4d9
-
Filesize
5KB
MD5cb50e619162074bd1d1f10450cc79392
SHA112c08cb9e323e5c0fd97220c423617b0c082c4b8
SHA25612981edbdf49dcf35f8fd26d35e19d003461dc63574855fd9b4363d5072f9f44
SHA512c12b72fab052ea00526576d5fc043e6ccfb73432258dcca310649df659e37e395802762fcc5355219737a7ed196ac7fa2c27bf84e4349d8bc068abccc9ebe198
-
Filesize
5KB
MD515d24ce8621de7add53f1ecf999cd056
SHA10b120c06fc81a04fd5b9451eaecdd667ffb4f03b
SHA25635d9a65c5dda2d54a0f875449331b610d4f5eed0df4e99422cd04ded1419a338
SHA512af0fed433e16f66255d1e0640340f7bc18fb352c9a9b6e212277e9cb666caaf3da8bad086c412db82fe42748ccb52f161516ce5c32feb909ca6749a8b871b4a4
-
Filesize
5KB
MD5eca184af59103732720d700ae45020ea
SHA150ac791950bebe4d798d3ff948d31c396872bed8
SHA25651fde519d16d20f2e90ccadabab7a101b499ff1fb31d7d5aeea9644adc000c6a
SHA512727e90da02517a63ac88fc82e97bed996181372be90b7f3270004ceb6fa26df0437d2ab6f864703fcc224935881ffcd58c9094eba0cd38ea3a21859b07485198
-
Filesize
2KB
MD559980dcd41a96b62ba5ba182493b0301
SHA1427d06719491f12b1cb6a2521929358d764bf7cd
SHA256daf89ee1b0192885f7ab50b87e430b102c8e930f20780470a155363f6e78eacc
SHA51200129d8bb567bcdd689252d2a609a95937a6c0f821999cd455434b76eae1819bddc301e8052c4dd0dc7e0c6dfba33cf2934a2b0ea7b172aee112cf984f337976
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD56383fef6791428e45da0b9c2371cdf34
SHA1e7498d4d2794de7a9fa6cb1924f1938462692d53
SHA25619cde75630871b3ba590246611e70a850157e56eb43b2aef9d429b7828bec578
SHA512401366fbf52ec1ca6084eb3ca1bfd26c24f459eb2fb0d277be50f27b307b559d6a9693385bc8e72f85a49d0e7acd13efb29dfc833432bf419dcbe17078a1a522
-
Filesize
8KB
MD5c53be640b730524d56856052b37ad6cb
SHA109cc774adc5064a9e139239036b250d8cfaf354e
SHA256543f2095863187e72237bb32d72bd1a04df92e86733ac0f17b8d5ff1672ee25e
SHA5127fe0c64a33bd82f3370333d92d15e578b26f37ae9e2ec6aa3bf09007a3b81d41adfe8cc4a14de4fa06365c8277ade11b07573e5ff04701f045bfa0491cd06795
-
Filesize
10KB
MD59ad895b04443bd1c44a4598d9ac5df6e
SHA1fc2dba6244ecbdb2e54cf2e15853cf497e30b693
SHA256a33717855e7bbfdd0dc5dfeb7a276aa5d2f4afb0ed6e5330b7a68f8467f6ab2a
SHA5122d63a3af8ac2399a55adb5c222b9218c8f26e757993d16f5a26e20e6fa7dc9c74d0cc59b7150d5e97393b180e32ece4fcd120566d64b2e5fa42ff5d327547ab5
-
Filesize
8KB
MD5c8b677378a04df90b70f592ab14dd69f
SHA1d84d937830ec211f6e9ab04eb3856cd813ab4ce8
SHA256fbe302fbd7ab1a6c5896cdc60ab45f87a0cd0576b04e629c6392f05f13057c81
SHA5127a5a8bea3c8cc14af81b353bb0128d327014de3cbb2c2eae6362fcf92ffd999140449186d6af557e32121a9b9fda91a9f383cecebfe69b60b0ce558e88d1a972
-
Filesize
880KB
MD5cc34b91b5b0db82cc91d84bbf247f75c
SHA1060261efe43817d4414ea6829ec3a9ccb2a5b530
SHA25604d75d8dafb8990ccbe011049285a6350ba62a55cdf18928067f392e93e85c1b
SHA5124ba00714251c379c8b0e2e6e12675ef6f0c298317e3a8c204405403d3f8acdd1a3d63dd08c7e494c91d4c97bcd9f821e793cbdc8285a42b2fa32ee6004389de1
-
Filesize
658KB
MD5bcee87123a04aac63585a0b10969eb75
SHA1ce31ccf742cd44570e30444d4ed772491f72b8be
SHA25625fff2de920e4ab5f3de6703f32a553af8ed1a52dcf0ba7bc009237773b1360b
SHA51276cc856d1a122120d1828207967b3e0187d7692cda5a14b1487c2086bf3357a160c126ec890dcad8b35d5408c3f0aba2d4ae9efbecd90a6dfc6f74e298249f45
-
Filesize
895KB
MD5059ca1a94e2f0103ad84363d2b8a6004
SHA181e4626062c97f256f5ce1ca80ae9f71090aed48
SHA25690dcbfc7d864e3b20aeb9e59d2f69161c080007a4da6981b3f9dda2eb91422ed
SHA512198350e41a36dedf2190c28433d54325f146f309a18f3d1090629eb25f50554ca00ff124d9631f9c8d66950ad4250e99914f1e55ab4ddd1e2b6e52aa0d960e38
-
Filesize
283KB
MD5115194524773e898d461c72e1ec92c3f
SHA1feb03af71198c467f3ee2716f72355f6c031b3c2
SHA25697925dcd9ebfe82e7ef9ef6a31ecbd5d178efc5c0e7c7985652736d9ff375bb9
SHA5129778c3a8af30ed884123e47d89d7257fc06eb10e24ddddec6fe986ec9168757effcd796a115cc0920163a1a48f59e11151363c8969b7f80daed5bbec7bc2ad54
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e