Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 01:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.es/url?q=queryf7lf(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fcyqpgnyciwml72zkqv8cfohbclplrlifm5ofa/eGluemUubGl1QG1hbm4taHVtbWVsLmNvbQ==$?
Resource
win10v2004-20241007-en
General
-
Target
https://www.google.es/url?q=queryf7lf(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fcyqpgnyciwml72zkqv8cfohbclplrlifm5ofa/eGluemUubGl1QG1hbm4taHVtbWVsLmNvbQ==$?
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 216 msedge.exe 216 msedge.exe 2376 msedge.exe 2376 msedge.exe 820 identity_helper.exe 820 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1160 2376 msedge.exe 83 PID 2376 wrote to memory of 1160 2376 msedge.exe 83 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 3732 2376 msedge.exe 84 PID 2376 wrote to memory of 216 2376 msedge.exe 85 PID 2376 wrote to memory of 216 2376 msedge.exe 85 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86 PID 2376 wrote to memory of 1548 2376 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.google.es/url?q=queryf7lf(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fcyqpgnyciwml72zkqv8cfohbclplrlifm5ofa/eGluemUubGl1QG1hbm4taHVtbWVsLmNvbQ==$?1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c9ad46f8,0x7ff8c9ad4708,0x7ff8c9ad47182⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1904 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8949213036033426708,16317986500905580622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
47KB
MD50d89f546ebdd5c3eaa275ff1f898174a
SHA1339ab928a1a5699b3b0c74087baa3ea08ecd59f5
SHA256939eb90252495d3af66d9ec34c799a5f1b0fc10422a150cf57fc0cd302865a3e
SHA51226edc1659325b1c5cf6e3f3cd9a38cd696f67c4a7c2d91a5839e8dcbb64c4f8e9ce3222e0f69d860d088c4be01b69da676bdc4517de141f8b551774909c30690
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
67KB
MD5b275fa8d2d2d768231289d114f48e35f
SHA1bb96003ff86bd9dedbd2976b1916d87ac6402073
SHA2561b36ed5c122ad5b79b8cc8455e434ce481e2c0faab6a82726910e60807f178a1
SHA512d28918346e3fda06cd1e1c5c43d81805b66188a83e8ffcab7c8b19fe695c9ca5e05c7b9808599966df3c4cd81e73728189a131789c94df93c5b2500ce8ec8811
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD52c1f8bf027e9aa08305e0a82e3f4e439
SHA1a267aff0b49ed8854f8e9eb6b9d678e1c3cb68dc
SHA256e794d25979f18b45ab9275363c98a42390bbe734fdaac9dd94c0fe5e0e44bb46
SHA512fae5c1f19a0ba4dc5557f32aecb41593da51274e09cd0305166f54f735937bb6262949e46adba40bd9c231234a0e02a156064d790a27f95388e51ce9e9bcbf5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD551b1d1ea373a03a9d039c2221439fe3f
SHA14b076af5c3ea876d45059b298078c4be7b0e6bbd
SHA2562b7aaf638e7a80cec8b9934239c805b377facf7d69629aa686bb020d683710c1
SHA512feb55a6c6458f07484b487d051fdfe59f36a5fccc474d4b509c5387bb13055bf2c19998fc9554c03fe9d94fbe3818c1f0c68821abb77fce80912afb182dd7de2
-
Filesize
1KB
MD5fff4cbc62f31979bb72657eb477fef5d
SHA10cdd0e9a17c45b7f031251efe1963a46f1a64549
SHA256ee7ead44dfbf45ef591dfc4880e6557b3c44558786b9eb5ca069d476ab251649
SHA51213e0cac0e53c9cf3a8d6bcecf1dd8b007b6045c268356cb2fc4c6460fd66e577b646772b62900646722a99b212d8d02cf64f2787d8cdb28e055d8628146e5ae4
-
Filesize
1KB
MD5cc7a97a19c76f7ae1a05b9dc3c8977e2
SHA16767b4826053b7b2ba74303045f1b35a55d56603
SHA256df49a7c79117628f08718bcd0dc9c2a39c68460040aa1775764f7c12718bde6c
SHA5128cb8c6514def7d276ddb52fdc6f843f63891069979ebdc9292707d10570f765bbfe6a90d8a3beba1d30b947bf7265bb3ccc3916f4346fa99fa03f5f48caf1026
-
Filesize
6KB
MD52a52af60f5f90654a002dbf81dad672c
SHA187d80ae798cf320092a2ddfa1240f028b3047ed4
SHA256a33996578e7f3621f4135af404bf5096a29a47e860be3e85ef33471a60059f76
SHA5120bab49b3bc36a3b816eb1262dd7dad899b97a203e378f79f73d8eacb35fdd32e856bc793eeec1541886f1f496a0025d62fcc9625f4656637e8be827a6090b218
-
Filesize
7KB
MD5cff1ff944b52a4bb2ded0d2929e0b3fb
SHA124d8608fab75b19dbb024931ff5b98bafeee211d
SHA25608d78f5f96ed434175791a7a8a4d30777105d82583ce8359b3003e4f2cc95890
SHA5122ea473b021e9cda096e72ac1228a90451ba6be948b2221476c1c15c473021cb1ad67fce183a65819a920885fd4d6d14067da6b36e0d3c684c6654d735080ddd2
-
Filesize
6KB
MD5dfcb4e6b275395c69f4fa0d0fb905c82
SHA13f2d6f1befb964f747babdba85d4fec39dbbf8d6
SHA25667e7fdb7b8687fe892f794eab924e862db777abaeace014de0e6e955a3f9c040
SHA5121f9a6700968816b06721218ec07c330998acee48da40e66d8c96e68f41e2215b28b43d6b72404328c2e9dbe03aefb3d45dbc91db478c558bbb7d0ac1670a988a
-
Filesize
8KB
MD562232cf7349961683c22fb91b253dce9
SHA16a062a1184ca11b5c603f48ef32aa66810a46b5e
SHA256c8a06a40a3d9825d27c148787ebd41cf8007a062ecc57340152a097923d0bff2
SHA5129df098a0f21360c1e1c533682f79cdb2a65c9bfd02338c7cd2baa40c1eda4c6dde85418f494af3506434bc42a180b6fded49f07c9bff89c91d40552a71706a46
-
Filesize
5KB
MD542e968d6f4bce0715889b49f48e0f7a0
SHA19165fee3a8534f4c3da85f8f7b0109110d07e1bc
SHA256568e424c45cf89b50d2782bcfad5b8ee70e47f123dcce24ad4da660d751aea32
SHA51259a0fb1d722fa5894fb6a89357dd63a5eb080e6086c8b33470623b176a87111c511a99603f239b8520500084c28fa403c9b8e32422f5a7818d82deed2086c865
-
Filesize
204B
MD5c2a6fd204b48dc72d182c8a15c8e5cdf
SHA1643525e341a8d53c813f59d2a6d906ffa250ef2f
SHA256c21669f577eeb86f520137ad20b7b663f68e98c992b0298a09c8b9fd26e24210
SHA51220c9933a5558f7e95838a4fd98d2167041a29dededacd612a241b5461940df0cfd12ca12edb44a9af879e564a7dac305a8f65ca609e638de39baa9d55d5faf8e
-
Filesize
706B
MD5cb61c2ce28e411e9c6d86e2738f6a6e1
SHA12b8a4a29db4c395acd22b5d1dfe3e5bda185dc41
SHA2566d9fff3b48db04f276425b13a95564e680988ecee7231841f08bde3df087dfc2
SHA512f5fd4de4cd594dc0689c5fc2053941784743d307d6905e4dd92222cf8bb832feaa56d255cd9507c88c71498183573d992c056546992b9f482377b378b976bae9
-
Filesize
706B
MD51800687fd413074e55f4bf322e5f8b91
SHA125c14b116d7eb1409d41c351f11d499a86739707
SHA2562d825c7d9cd71a3db4431ad169fb04c9914e2b1d5ab245f4d14bbaaa1c3237de
SHA5127e6a8048c3c5861c3ac58143a89d0d3b24bc2d145c5a6aa61c4eae3ba86fe75db1490f119a08f73441d4b65ec31aa01852530fd913e59db816b38a58e0066b3e
-
Filesize
204B
MD58d40ffc721ebc285d0907afd25c92977
SHA1f02741c264246fec73b22825fe5d381ebacb3202
SHA256085055e8bacfc9b51a9859ebd336014e39a3475768de25b23f70699af5a31389
SHA5123005b6d02b70ee0ff0bc361bce47d03880bbbca43faa21a64d2c56753c27039cd519b68af1318f4850b94fb58ff0cd5e818e84c2f26779d7635ba5d49a325bd0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50d5121563a346cf416de0f11c83ae269
SHA1668062e234dc65aeffb0e4ec2a177baa677b6331
SHA2563c8d9dea0fe5433eb43bb00e38b8e60a75257d1c82f26d07f1dd136963c060cf
SHA5124e3831e4b6a17478d7c71a6592f721dcab073b027f4902ad9bb86df583eb33d46bda3033382b541d9f27e5e76300ec150fdf508c7df79ea351220b83afcd75ca