Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 01:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.es/url?q=queryf7lf(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fcyqpgnyciwml72zkqv8cfohbclplrlifm5ofa/eGluemUubGl1QG1hbm4taHVtbWVsLmNvbQ==$?
Resource
win10v2004-20241007-en
General
-
Target
https://www.google.es/url?q=queryf7lf(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fcyqpgnyciwml72zkqv8cfohbclplrlifm5ofa/eGluemUubGl1QG1hbm4taHVtbWVsLmNvbQ==$?
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 3540 msedge.exe 3540 msedge.exe 1164 identity_helper.exe 1164 identity_helper.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3388 3540 msedge.exe 84 PID 3540 wrote to memory of 3388 3540 msedge.exe 84 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 3944 3540 msedge.exe 85 PID 3540 wrote to memory of 4944 3540 msedge.exe 86 PID 3540 wrote to memory of 4944 3540 msedge.exe 86 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87 PID 3540 wrote to memory of 3056 3540 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.google.es/url?q=queryf7lf(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fsafrareal.com.br%2fyoya%2fcyqpgnyciwml72zkqv8cfohbclplrlifm5ofa/eGluemUubGl1QG1hbm4taHVtbWVsLmNvbQ==$?1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabb3246f8,0x7ffabb324708,0x7ffabb3247182⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1948 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,6381713422165785252,12618740029261804123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
126KB
MD5003bf1d9e2e0c8d3d377b47aa8e7afed
SHA1aecce398f002e2c964d9bf59359ee0a3f7541df3
SHA2568ad06de68032984874454018b9b5865eba2cc943a59fae74c31d300908e8f98c
SHA512042317ad4a6595f3e94c071707549a29c2f8a9a426c9ca66844d964dc636ba4225a8dda507d54f6b9bf105534b11cc21f452971f5a79d9d735a0513f87659f3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5ce33eae49df6c2db080a59f523f67f9e
SHA19b7356871a533b752d4bc0db66992efbb83d9ab5
SHA256819c82b2dccdf69edc6a0dd6e5b172d2437479b6129a6b1f32935ca6869ad9b0
SHA5122ad25eae31e0972dfb0c61d18d88356b2c918c240e69bc16d6d94905051eecd6ca475e309c1ce9b70aa234fd16409ad07be7a543c0e67870b1d73d8b1a8f7787
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD519551963deca0059055fa647e32c5ae6
SHA17257941951a4668a29509a81a499c27ccd15cc0f
SHA256d3f47b6a138d84b9cc95a4798b07ccefa89c385cc0587500879dd838619403ec
SHA5127689697d5ac8a8ec07238f35e115df008af97301c978bbf699606734e50f45a92824b4ad4aa33d39a62521fa8aaffd87ddd615b00a5a7e9b7de942cf411c8169
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a438d2ea76f272febc65809e9463ce4b
SHA15ad6a7cfe3c56273dff481f1ae27a01194b5be02
SHA2564db935eceef666f8f89f01d14b132c0791101df9e5a237ae7b5ee784871643e5
SHA5128cafb0a11659bad064498cb6c222016cc9f34e2b5c4660115817e5774c3f67b041332f87aa98c84ef960402c3aa3f4df1e30625ee1399748ecc8ddfddf926ea1
-
Filesize
1KB
MD56e1dc03e505faa6c5e38e437e792a413
SHA1799716cc87bebc65792f05a0a045b3f9893e26e0
SHA256066046b915dcea14bfa6646d6fb4b3cf855b42025f12209f93c9af8f31209b2e
SHA5128d752d2c1c261488db5061309991122705fac6b0649acc487773a383818bf86d327c8f3f295ae5a3fe729b829f4ca0feb1dbc71826622c14c6e8ad5139b11416
-
Filesize
7KB
MD5fc96b525e4ae2696c3e38e4c96b04617
SHA1f86d3c68b5e404861e354bd9adec51bb2213aac7
SHA25654c7e1d7f40a7e0f3eb50c72ece0442829cf246435546469b4926c142dbc142f
SHA5122909a99a517e85a1fd57b49a09b8adefa37c697cf667483ca1902ba6d08ac250d9b6adbe9fddf60ccb8326a4d5fe027f958901b03d5fe1a71aad4569902a2d80
-
Filesize
7KB
MD559fdde125921381dc36c6ebbb55ac156
SHA189ef530000b5909e7992c1ad3a0835c7bf824296
SHA256c8435ce20da5afebc69f6664d946bd9a8c732830d3ce6103079ae9a0cda8013e
SHA5122e613674371d13543205381f544d26f42f750d6d53e28ea171fe1d7a96f83c4ac9537b8b13f2dffef948b2e4b3577aa0fd9b2eb3f7b6d965b56ab8400f7318d1
-
Filesize
6KB
MD5237e172dc75d66e733742af43d153f32
SHA1047bc5ec721a07087654e94f902203f48e14f3f9
SHA25667c83c3e2f52fa612670775d6e37c3c9fdd89fbdcce99697e5c5b45173d139ab
SHA512daea4625445c6890fa0437ef519d9f512871adc9eb84dec6586a0452d6adf4532d3c52422d62821f9b92dc46a47b9299aa97e4f173f7631979af275d91d27dcb
-
Filesize
5KB
MD58efc407fd6dbb252dddd1cc0c332a03f
SHA147bfa30c98ce076b09d18cb19aa217128d6bac71
SHA256cba1a829a3f9265e1ca7579a5c2e1f8bdcf211c408cc4d5029dede35f1bb2918
SHA512138f131fc95cf1f447e88474b81aacf2a45d1fb51723a72bf37ccae4c3b27c232ed40ed70e4d1c0726ecfcf6db8ee0e535c82dc5c421f0f834a18c7baa0835e4
-
Filesize
6KB
MD56a6f4c8435eb3a7d9310b0b0a688ace0
SHA13e6b4fbb30981fe6bfa71052fb579f20458b62ee
SHA256dd761c6386087f76cdee5cc8808b5a0b23d5bdc2f19a251fd56c13f2e3a9ebb7
SHA51221be11d0cba46d51d31b1d3655d1308104ef30282427a32dbdddef962e41bfba07acad50f80bc93850035f225f091e2cfdc292c870130e1d59a3b8f9134bb246
-
Filesize
204B
MD5b03fe8738084167a89ef408cbaa9f0e6
SHA17804eac8fd621f0222479fef7e846500d19d724c
SHA256637be2b0722786e16590f8604dbe12efb2682d429488945118834c67f9acd96e
SHA512976b7ade5f2c56e1c59e2b5152bd883c47e1fd4ff6ac4c278fa4e89c708d44d95f510ef425be18d0c7264b1636e0b1556d67010b27bf9e8ef42ebda52ccbef7f
-
Filesize
204B
MD5218ff2c3b6fc9c1d4711a91e75313ed1
SHA1ebc2cf981bf22266c520184d824f28546bcf7cf1
SHA256597d59897f73be4fa059e7ce20f6fdea50b2b6c4d490dd114ff21b99f6ed2da4
SHA512b1bf92d6795a561f88d0c2fc8e18382f2f7a3217c7b826374cbfc9dbc7fb26693bc0ef82288ccc773ba652410d3f7472b9c9c474af0677ccd6f2478ce9e55b7c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD511747b2b02b08a1712a986f65115bc39
SHA1da90c941b0394a57ed7bb7780e5428b8f10301dc
SHA2569a7748fa01990e8e55dae1f7405d0008c0fff91583fdd4820555e7ce1799808d
SHA51296e3851333d09042dc8415e662ffc2d0807e5199269bec7557c1d6d65cc54aa7d9063fceaf931f5feaaddd105ad8595d0cbc6c33e254c8d900ae42469778b625