Resubmissions
06-02-2025 15:35
250206-s1njpsypez 405-02-2025 16:40
250205-t62tysvlfv 1027-01-2025 09:56
250127-lym2tssqf1 319-12-2024 16:24
241219-twqc6swkfr 904-12-2024 21:04
241204-zwlb4sxjdr 730-11-2024 20:46
241130-zkncbsyphl 310-11-2024 21:18
241110-z5t1lsylfk 1010-11-2024 20:58
241110-zr6r9avgpd 810-11-2024 20:52
241110-znx1yavgje 310-11-2024 20:50
241110-zm2yhatrez 3Analysis
-
max time kernel
81s -
max time network
84s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-11-2024 20:49
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a9154caf-0878-4a9b-b41e-301efc4a59ed.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241110204931.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 980 msedge.exe 980 msedge.exe 2800 msedge.exe 2800 msedge.exe 3516 identity_helper.exe 3516 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4464 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4464 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1300 2800 msedge.exe 82 PID 2800 wrote to memory of 1300 2800 msedge.exe 82 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 4980 2800 msedge.exe 83 PID 2800 wrote to memory of 980 2800 msedge.exe 84 PID 2800 wrote to memory of 980 2800 msedge.exe 84 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85 PID 2800 wrote to memory of 1496 2800 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://itch.io1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffe300246f8,0x7ffe30024708,0x7ffe300247182⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:5216 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6f0f05460,0x7ff6f0f05470,0x7ff6f0f054803⤵PID:1424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:12⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7096 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2168,9497386640881929463,16872114191843896898,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:5324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1136
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x52c 0x5301⤵
- Suspicious use of AdjustPrivilegeToken
PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ef84d117d16b3d679146d02ac6e0136b
SHA13f6cc16ca6706b43779e84d24da752207030ccb4
SHA2565d1f5e30dc4c664d08505498eda2cf0cf5eb93a234f0d9b24170b77ccad57000
SHA5129f1a197dccbc2dcf64d28bebe07247df1a7a90e273474f80b4abd448c6427415bace98e829d40bccf2311de2723c3d1ad690a1cfdcf2e891b527344a9a2599d8
-
Filesize
152B
MD5fef1d650aaefbfdb3d3288be30bbd890
SHA192945eef98f78274539024ec94007add6a8bb5d2
SHA25677c82a1c93cba87c54dcff2cf6eaa495983f3161085c371adbbe72f38d2acc1e
SHA5124ba1792425040fb77fbb3d573b741a475e7413892a6ccf28facba78dc17aa9c5938940d54b946eb5f63beea7cbfd4a7c93e286093f370a4f8de57120756ca09f
-
Filesize
152B
MD539191fa5187428284a12dd49cca7e9b9
SHA136942ceec06927950e7d19d65dcc6fe31f0834f5
SHA25660bae7be70eb567baf3aaa0f196b5c577e353a6cabef9c0a87711424a6089671
SHA512a0d4e5580990ab6efe5f80410ad378c40b53191a2f36a5217f236b8aac49a4d2abf87f751159e3f789eaa00ad7e33bcc2efebc658cd1a4bcccfd187a7205bdbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59e575c4894a8030fd8854d61d6bacdd3
SHA1ac8681b0c1b6a54db11ab043bcdd7ff44c2d0228
SHA2567aeaa10f902ca0b372f1cfb56cf5a0b27aaea444251afade219481da0b059acc
SHA512ec3213425283d79513eabb857d77b7b9148f1227777e29981cb72364689f3118d5b27d596d4e941ffd6486e7130bb2ed41f379060d10ae58440d797e22657985
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD51ca5dd39e923c5c0068412364e29e8a7
SHA13267e52265d858adf59e09e07f4a606dcb7e7f8c
SHA25629e68fa191b5e68351181aad0099e3533ad4a890c83ab03c35219cb7c78fbb0b
SHA5125eee872e0729ca21ce4028738e78acdceaa78e8b8331098135803f6ea357af378fb54f2b82850e45091a0ecf0166749eb1734472e27373aa06d3b4063b5a9989
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
944B
MD5da799bbeca4e84557db392a4afc41a02
SHA1f068e6d1524dfad508d38781ace63945e0e32a69
SHA256dc1987d6534c1ab2f7d7f0b9c512c307bf40aac36a2fa7def098e492d6c01f59
SHA5127bd6d6dd130945d0882fec7235696455077778c9048ac3cb1ef4a7d50aff1e666258d09aede40d32b33625a444f7d2d860802878ab23dbd614d4a1e62f601e57
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe590035.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
6KB
MD5f615d94024fb575c34fbccb8e2e3f019
SHA1a2d2b79bcae75fdb2ba1d73678b8909eae64ea2f
SHA2564edbaad2b6b514652714d93dd667b1451a3640ff6298939af037a057bac16af0
SHA512c6003d3792e90bed8e5c079e5f8921439b60361bf86e4b1e5862a1730ef76bdb2c1af49789f6557808b5ae1cb1479bbf9309de82a92f6b53ea304a35d173856d
-
Filesize
5KB
MD567e3aff523a727e5aa18ada30f4d9849
SHA1e0ac1d788b21730a4b2b3df59e024619ee81decb
SHA2566d8938eda35d462b54e8fd0addfc52d38116e69882d69c45f271c92635b9dcef
SHA5123dbb4e628da96ac52e46b222938d9d5b286a54f45e02c8ce48ec8f645993ee232235682c342f968056aa5077d9deba824c5099e1af5573b8bde92f017d01b32e
-
Filesize
6KB
MD5e2a2f6aae103c24951d53fa18d3c7331
SHA1b41f1f988bc31d7059ce728fd5d1ef240968d62d
SHA2561afac741b295f4478091659fd6b6cbfd10eebceb0d64a2d7ed5d3cba592bcd2d
SHA512e0a4e250bebdecc6f2badf07477453eb1e286d735a1322f35687f3d19c65991cc69edf0b0fa0100999ce8259b7570bf5f088b0370020999870529cc35260c688
-
Filesize
6KB
MD56ce303a089966c157124eaa87938529c
SHA1deec1f40b4b59f5d9e7623f66f7aae8bc8616db6
SHA2568ce811b54a3d373dc635e56537cd3585cee5ac868949ae71e87aa1584f84f91f
SHA5122cea014b2c9b41f6b0a6fb713c8f48fd6cb7e3912dd660b48d0b40bad06892fefc3ff64b23d1fb9d1b85961163a480c4a4a8dca32ce2274970b84ccfc21e312d
-
Filesize
24KB
MD560d82bd601d64fd00bb0373f5ecd65b8
SHA10e8bde426270dfa3ea285c2c5b7282ab37771d4c
SHA256bdec91a5061c6a400ef33c2dca5b1d0c16c1fe9e464f8ec99a72442b752e6a97
SHA5125ea1b33784438acd246c02c95716f72c78293bc8d8e8e6d71aeaab370ae9fc2063ba8ffa443bbfc26c96e45a95549b62894b846a459c986531b34a110d0be38d
-
Filesize
24KB
MD50e98d1679e15688ad133f11eee8458ee
SHA1a4b1a83f0a3f2867954d3146d95d314441950606
SHA2568aa7eaf918f2969424996a8f3575478006d9d74b308a750f996fe4f5f045554e
SHA512eb34d52a8df4992444000a93c8d0d11254069b5f43a68a6def21061be03a538f36c42b2e968a8637f12b93235de3140002b0212aa2cdebe0950fd115c04bc72f
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5fbc46acab7d25826e66fe118d39fa04e
SHA1f6507c07cdb41955506b83d94032258f017a0770
SHA256bafe0f0b6275e6fc6e29596e2e9aeb6549fae77895b0ab4d4d13a4564b5d0637
SHA5125e17a110285e7f6d6392806517a50aa5812d1373af04e07e84da341faa3d1b151df4d56f15a6c689b3f868c65aeedbc112dda6123df5745719c0e596300ecaa6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD51b3760ccfd3d380d405973767ae73cd3
SHA1fc6a2e1d9b8c29140579053c4e7b32005f69586d
SHA2567ccde2aacf02707e36a6b6b3a77a90bf26bf1e26b9aefe0090221abe2552f251
SHA512482214e55aac07b8f919fbfd87ba9f90c1a0aecf0d9c4650b9bd159b93d3a61cd20becd47343ce97d4aaca963046ca3596f4e8d3bc39fe0c42045267ab4efb62
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD55655559fe8f967c79073c154db2c3b2a
SHA145ca18e143e977a12ebf4dc96c8c6a726522f70a
SHA2564b69098a3d56f54e6f5d140d8a9f1c2e54cb89ff8384a8f98dac6c5e4873e0d9
SHA5126124d6b1feec8aa6b85a67753c31bb02d7690e4f8905bada6399757cd89609a2a5aea4e89b5c1dff6c25dca034c469f76ccece3b87a14d9505dada88015a5eaf