Analysis
-
max time kernel
1192s -
max time network
1162s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-11-2024 01:48
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 10 drive.google.com 11 drive.google.com 12 drive.google.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\afe6464f-dfd1-4795-813a-705afcecc314.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241110015021.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 4320 msedge.exe 4320 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4320 wrote to memory of 3964 4320 msedge.exe 84 PID 4320 wrote to memory of 3964 4320 msedge.exe 84 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 4332 4320 msedge.exe 85 PID 4320 wrote to memory of 5072 4320 msedge.exe 86 PID 4320 wrote to memory of 5072 4320 msedge.exe 86 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87 PID 4320 wrote to memory of 624 4320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1lI-IL0gg8WoRTc-3cazYsUkFjjstyCRX/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffbf5e046f8,0x7ffbf5e04708,0x7ffbf5e047182⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6a1af5460,0x7ff6a1af5470,0x7ff6a1af54803⤵PID:3904
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:12⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:12⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:12⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6059642658508223507,5106235029736343537,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5fffb9ed7c2c7454da60348607ac641
SHA18d1e01517d1f0532f0871025a38d78f4520b8ebc
SHA256c8dddfb100f2783ecbb92cec7f878b30d6015c2844296142e710fb9e10cc7c73
SHA5129182a7b31363398393df0e9db6c9e16a14209630cb256e16ccbe41a908b80aa362fc1a736bdfa94d3b74c3db636dc51b717fc31d33a9fa26c3889dec6c0076a7
-
Filesize
152B
MD532d05d01d96358f7d334df6dab8b12ed
SHA17b371e4797603b195a34721bb21f0e7f1e2929da
SHA256287349738fb9020d95f6468fa4a98684685d0195ee5e63e717e4b09aa99b402e
SHA512e7f73b1af7c7512899728708b890acd25d4c68e971f84d2d5bc24305f972778d8bced6a3c7e3d9f977cf2fc82e0d9e3746a6ccb0f9668a709ac8a4db290c551c
-
Filesize
62KB
MD5c3c0eb5e044497577bec91b5970f6d30
SHA1d833f81cf21f68d43ba64a6c28892945adc317a6
SHA256eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb
SHA51283d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38
-
Filesize
67KB
MD5fb2f02c107cee2b4f2286d528d23b94e
SHA1d76d6b684b7cfbe340e61734a7c197cc672b1af3
SHA256925dd883d5a2eb44cf1f75e8d71346b98f14c4412a0ea0c350672384a0e83e7a
SHA512be51d371b79f4cc1f860706207d5978d18660bf1dc0ca6706d43ca0375843ec924aa4a8ed44867661a77e3ec85e278c559ab6f6946cba4f43daf3854b838bb82
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD501c6cd710143778f06be883199ab0a04
SHA1d7e40c471d0b810eb62aa755b3f7c291e5457ae6
SHA256615613f00cc4f53eb26ef4a0af200ab60ce41f1a82ba006520387f5abf8821df
SHA512d948bb45fd70a96066570ab940cdb2b28824af4166bb316ae6587bd111cafab986901581a72aaf44ae3242d0a770a75cf2577f0005ee1f8ca42060ed7cb6997e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5deefa420518317ed73d0df2f2cc1aa15
SHA11f0f2208059e3c9c7a53c821621ac473025f1937
SHA256dff712bc4caddfa36b98bfb77c4818b97eca3d878181911a0c8dff1089224cfa
SHA51218ca711fce643a457a0e55f67b67c9f977ce5edb0a31afcf86ce8c6a55c2cf3fa251dd99c90aaab73c6d1da12097744c58a5e83c96cb7ce65d6c2d4a57165699
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
5KB
MD5819c32fb489293e222f616ea6dc2ca80
SHA155f71ee148b4ef9b2dabfeb60dfd94d59514b33b
SHA25636260a368b2bcae48754cb1985df948949da7a5ec5871fa5713dde79507cba2a
SHA512a116c0d4ef8e743fba1f961996bb5a0f908f908be0dfcb82f4fee209e5cd97e0b1098bcad41c4003ee1d29a75e923b321dcaad2a917062292c7009e9cf27a62d
-
Filesize
5KB
MD58ed210257ea89a0c334df13a5dd5611a
SHA159109703f6ddc73aabe4447e589840c48b50b788
SHA2569b3090d987552eac7433cce2f25b5b7134bdc40df3212de7ff152f07a926a189
SHA512b4491ed2f38438703083738404238924b7ba1505ff43a96a2de7710beebc64d9ca46cb8ac54a63d313810fe3eb73da34796fd4a7eae7facd13d803d2dec0f554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe588be0.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD5abcb1cc146379a00ec0090326ae46812
SHA123dc85447181bacac646bd78c4a134f52f122f82
SHA25690647801b36df3d87083b0ddcbc950e47e1c28e205088a61e9dce8d7b19b60fd
SHA512f9590bfd6f459dc36a2dfcc0438776e586c4b91fc7c34bfe8246ae242f6c5bbd49dacded28c0065504e85836413bc8329281372e5ad4b32fb56bc1ea69d1f31b
-
Filesize
5KB
MD58c095a2a59189a571888df9844a178de
SHA1d1ac8537f2f0cf8fe225de54f68193305fb2e746
SHA25604daf2ad12362695f6d28bf816b45b18fdff53d50586a8d9cf5214a84e28ca99
SHA5121c240d1f60a1647e3e87dba5e5cf14d86d5fad0a392ddb07a7d5847c9a8d8274c03cd7bdeb674956b3d0a89d3a5aa0c2c267d5042fb59f1f55fafe78ba7a322f
-
Filesize
6KB
MD5a170e02b7ba73a1e2808c589859e832c
SHA1e80cd3a808a4d1570adb39eed1afa0a85fd1a806
SHA2561fd594ea782adbc91ca7bcfedbe92f1c42f9fab9dcdcce44f9a526ab49bb1e3d
SHA512695cc72bbe80911b9851a6ea69f7140a51ffb97ddaff897c23c6456a83445bd87f4be424ce9450d1ab5a52562f802f994fb2e837f8ab74d66662c52736882376
-
Filesize
7KB
MD587f7c63eb5785a89ad82f633cab15896
SHA159fab5e17b193772c629295ed1f2e3c2a8444e38
SHA256af36106c04acc18c0469a00cb49cb10cdea530cfc5f62511650b7d98d94f2ec9
SHA5124914e5992cb484c7da4a812f2cad257f0c0082209ca7bb6efefa58020a798634338799e4e224c1f7b6899e66532e1b283f458a8f9524b5b031243f67fcdfa57b
-
Filesize
7KB
MD5dc8dec3a0fb397a6b76f888158291960
SHA1dca8196d4f8817cbb0542d3f85fdc5bb7181c5d2
SHA256d11658ce76b668e772d210c73fae6a913bebb1944725125cd13834e10992b3ce
SHA5121a4d319f6749faa47f27b7c07d67d57970cb5d1518e12f1d9ca0e7e7fa5f5c02690d1f7a026a535b6ccc8ff1bb079893cf530eee5b7ac72ab29778c87e56cb5d
-
Filesize
24KB
MD56e466bd18b7f6077ca9f1d3c125ac5c2
SHA132a4a64e853f294d98170b86bbace9669b58dfb8
SHA25674fc4f126c0a55211be97a17dc55a73113008a6f27d0fc78b2b47234c0389ddc
SHA5129bd77ee253ce4d2971a4b07ed892526ed20ff18a501c6ba2a180c92be62e4a56d4bbf20ba3fc4fbf9cf6ce68b3817cb67013ad5f30211c5af44c1e98608cb9e3
-
Filesize
24KB
MD5ac2b76299740efc6ea9da792f8863779
SHA106ad901d98134e52218f6714075d5d76418aa7f5
SHA256cc35a810ed39033fa4f586141116e74e066e9c0c3a8c8a862e8949e3309f9199
SHA512eec3c24ce665f00cd28a2b60eb496a685ca0042c484c1becee89c33c6b0c93d901686dc0142d3c490d349d8b967ecbbd2f45d26c64052fb41aad349100bd8f77
-
Filesize
3KB
MD5dbdb2a8243c12b79ab46d5dffe741d2b
SHA1701c030130a33656d7595b2454f9da166c65e881
SHA256b7357c38727b6a6800d88a0d305438d157a5f00df4e7fc0f642b7d22f0bd15b6
SHA512b1b2aab82d870f75530381d6f85682de76411af4f4c11a319d7a8e330e62923af55a6617b1a080692ee3fd2fd5b98f7f544144cb63e27cf2ce08969176d654f3
-
Filesize
2KB
MD50b3d17ea60976c581342714449fef958
SHA1fa50dbc214defa5f1c4571e52c5c1f4d84fdbdba
SHA256d92200ef9a0d9db2098858784e6aa1811d4b2dba094f6827eb9f79edd12edcba
SHA5122fadb62d82365e6c9a1df7054aa978d35401070dd2f36a6a2840e9983677a03c01ed035185e3fe102f156af67d97299c58142748e8e7f5b3c9fe63d2bf914fe9
-
Filesize
2KB
MD54b39392cdb4a506aa056131c749a370e
SHA1afe8d2220b6ab95c78593fc29ebfc02e954792a1
SHA2563d5a4971c41067a253cfd4aca724c5b9de6b9957532d44daaedf0835a7831cc4
SHA51240cc761bfa27603cc3d006fdb99275bc71404be50dcef03680842854c5af42fef52a004259c3d0b900b48875e8152019c0038eeebae79c17a41492f51ba9c5b9
-
Filesize
1KB
MD5feb88d84f358dc5b3d9ce2acc4a53ce5
SHA172ac22c2f2102ac12c1a395529cbe9ffc12b2266
SHA25622b352c8e008c01186b05db993d95f6ab2913375af75ee09eda4413fee37310c
SHA51254ae23c6f62d65ccd7b055d34840464b18aca66e85227db43b5ccfad39b75e56d7fd7e951606f1f943e1bf9e70cc3f1d26db500484b83dcc828c5ad3929b02d0
-
Filesize
1KB
MD5d8d841a95bd208a79efabd9649bda325
SHA14bb926ceb09168ac1ee61941311f5472ae3e0970
SHA2568e560457421d99672e1a8666de8ac01780bef4ef3b112de63f431ea427331911
SHA51210d9b5c19bebd921af7b6eb425736312645418321de4708bc2a09a54b90e601e1872ed5f2675d3ebced9e3148bb1e482f8b5b0c8d091fcae572870d9ff9def76
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD518817d7b2190e5f261356969b7604423
SHA19b6ec1ca69dd3e8837ccdf54c8771856a212f088
SHA2562efcfa7a72b8cb52b8c2511f187f4558544341eb85aaf73c38cb6740fbe919fc
SHA51214c1f29a808a22a0809a4be9e1c00bd7ce2bf6b579ece5ac6a884fb83cab8fb7cd22da54432e17d5791f2e3b531b17a96f98a3bf26486d9ca318a61d57a372c9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5db0bd8a6838e31881b8d13c004d893bb
SHA19173b273fe6bf85c327b24996d65d493d82ad0f6
SHA2569cb5fe1705c38300b55f6b4bff75a905af5e631d66f3c9880349f1313681865b
SHA5127cfad0b0de125841256b526abfc3e7fb165df88336236bee75a0eff2ef96dba7cc7c2b308dd087bf7086cd570512fdb525ec243beff99958395a762cb402c9af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD55acff87353e800dd37d5be82dfa8dca2
SHA1de387b36842e31c0f338cbdfb0c632184234b767
SHA256839c759e748219c5195f98b87291d322468bf24d2b8b232822085ea00a5a0a15
SHA51210983dc72974fabaf656d8ea3c227b644b6247dec543b51e5c40c6a793d47190359b17bf11e4807e84d15e1fffa78e5cfac25702283c796ad0cb71c19b5b4fe3