Analysis
-
max time kernel
108s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe
Resource
win10v2004-20241007-en
General
-
Target
0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe
-
Size
842KB
-
MD5
b11247d5947ca817a59f2bce4a2565e3
-
SHA1
6c664f1d47a41b02fd3a83a721995833b03f25c1
-
SHA256
0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534
-
SHA512
fab4b1920682eb4cd33f60fc7c6ac823d65a0103483f5ed5db8bacd5f713b4ea6f256671c03a20617e77c4ca9abd2e7a2e6ff09a2651b8b206039cd18ea8a2cd
-
SSDEEP
24576:zq9FZgv6K89zwCgGofKP0fHxwa01vRrSNKFkXi4:oFZgS9O3SPxa01vRrSNNXi4
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b96-5.dat family_stormkitty -
Stormkitty family
-
Executes dropped EXE 2 IoCs
pid Process 3032 svchost.exe 3832 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\svchost.exe 0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe File created C:\Windows\System32\svchost.exe 0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 1536 msedge.exe 1536 msedge.exe 3196 identity_helper.exe 3196 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2496 2536 0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe 82 PID 2536 wrote to memory of 2496 2536 0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe 82 PID 3032 wrote to memory of 4508 3032 svchost.exe 87 PID 3032 wrote to memory of 4508 3032 svchost.exe 87 PID 4508 wrote to memory of 4040 4508 msedge.exe 88 PID 4508 wrote to memory of 4040 4508 msedge.exe 88 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 2620 4508 msedge.exe 91 PID 4508 wrote to memory of 1536 4508 msedge.exe 92 PID 4508 wrote to memory of 1536 4508 msedge.exe 92 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 PID 4508 wrote to memory of 4524 4508 msedge.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe"C:\Users\Admin\AppData\Local\Temp\0a60ccc70306d123abe0cca9c282b476792015f0de3e1df4395f357b18c10534.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /run /TN Update2⤵PID:2496
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecc4546f8,0x7ffecc454708,0x7ffecc4547183⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:13⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:13⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3088 /prefetch:83⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:13⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:13⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:13⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:83⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:13⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:13⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:13⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:13⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2532 /prefetch:13⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:13⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,8165954509866478507,2399153000689704885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:3884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:4228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecc4546f8,0x7ffecc454708,0x7ffecc4547183⤵PID:2628
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:2708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecc4546f8,0x7ffecc454708,0x7ffecc4547183⤵PID:4280
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:2820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecc4546f8,0x7ffecc454708,0x7ffecc4547183⤵PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
68KB
MD532fe5c41c8be4730533b24849eb992d4
SHA1a7c6fb7380ab8ba18a92ce65709bb44373770d3d
SHA256174e2b276c85066c277f923bcd1bfc085c0b3a836e1e4eab5fbafd5c9b804411
SHA512ba15cb8c63de949ff41b2fa0cbe6a073ee3f446d820fa49364f449b342e0f8ae58868c141f155734855c7679f5d9038e6935b513f782d8e073df84a58be81436
-
Filesize
487KB
MD5831a0aa25af2c60a7380ea75c321d930
SHA1140ec306c24ab6f348c4dde5900b219d817e2026
SHA2568cdde5daa52335c0a4e416f6fc22aa80744207a38fc276bd65341c2d2e903557
SHA5120147937b2b2cf9bbf7e8dbee2d598e156c6ce4ddff224b3dc48caed96e89038ecdff1ace743b82fdf6155c40b674f4b1983693dbe45c39898487d3b7be258161
-
Filesize
89KB
MD56c66566329b8f1f2a69392a74e726d4c
SHA17609ceb7d28c601a8d7279c8b5921742a64d28ce
SHA256f512f4fb0d4855fc4aa78e26516e9ec1cfabc423a353cd01bc68ee6098dc56d6
SHA512aca511bfaf9b464aff7b14998f06a7e997e22fcbe7728401a1e4bd7e4eceb8c938bbd820a16d471d0b5a0589d8807b426b97292fc2a28578a62e4681185556c3
-
Filesize
34KB
MD5522037f008e03c9448ae0aaaf09e93cb
SHA18a32997eab79246beed5a37db0c92fbfb006bef2
SHA256983c35607c4fb0b529ca732be42115d3fcaac947cee9c9632f7cacdbdecaf5a7
SHA512643ec613b2e7bdbb2f61e1799c189b0e3392ea5ae10845eb0b1f1542a03569e886f4b54d5b38af10e78db49c71357108c94589474b181f6a4573b86cf2d6f0d8
-
Filesize
17KB
MD5240c4cc15d9fd65405bb642ab81be615
SHA15a66783fe5dd932082f40811ae0769526874bfd3
SHA256030272ce6ba1beca700ec83fded9dbdc89296fbde0633a7f5943ef5831876c07
SHA512267fe31bc25944dd7b6071c2c2c271ccc188ae1f6a0d7e587dcf9198b81598da6b058d1b413f228df0cb37c8304329e808089388359651e81b5f3dec566d0ee0
-
Filesize
79KB
MD5e51f388b62281af5b4a9193cce419941
SHA1364f3d737462b7fd063107fe2c580fdb9781a45a
SHA256348404a68791474349e35bd7d1980abcbf06db85132286e45ad4f204d10b5f2c
SHA5121755816c26d013d7b610bab515200b0f1f2bd2be0c4a8a099c3f8aff2d898882fd3bcf1163d0378916f4c5c24222df5dd7b18df0c8e5bf2a0ebef891215f148e
-
Filesize
19KB
MD54d0bfea9ebda0657cee433600ed087b6
SHA1f13c690b170d5ba6be45dedc576776ca79718d98
SHA25667e7d8e61b9984289b6f3f476bbeb6ceb955bec823243263cf1ee57d7db7ae9a
SHA5129136adec32f1d29a72a486b4604309aa8f9611663fa1e8d49079b67260b2b09cefdc3852cf5c08ca9f5d8ea718a16dbd8d8120ac3164b0d1519d8ef8a19e4ea5
-
Filesize
259KB
MD534504ed4414852e907ecc19528c2a9f0
SHA10694ca8841b146adcaf21c84dedc1b14e0a70646
SHA256c5327ac879b833d7a4b68e7c5530b2040d31e1e17c7a139a1fdd3e33f6102810
SHA512173b454754862f7750eaef45d9acf41e9da855f4584663f42b67daed6f407f07497348efdfcf14feeeda773414081248fec361ac4d4206f1dcc283e6a399be2f
-
Filesize
32KB
MD56e78ee324e008296108bfcdecd77e318
SHA1f7c39ee02c65bceb2c66ad2d7f45523feb5ad156
SHA256eb7a4ff0f8ed4c8a95b2183968b5a59f4058b177f580ae2d2bef4595b6f6e092
SHA512bcfff936bcc46ab4120690cff3af93491080e13084ea2bcd8bce1a2470ea86eb007d695aef23b73e0b84cb3c7fbf351d025be47ec5d232ab613a420074f8a448
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD53e5a921d9c6f9653b6b316e46ea838ee
SHA129e5042d8f82f82f1ea92be4bf6f164ebabd4dd2
SHA25689141fc67f65743c2398177c0e40710f47f45755d7d385457ea53c49fac40f89
SHA5127f6019b1666e278539874062244ee38b936029bc37e1af3dba40af37701c9393c91f8801759d6217b67662aca77050c28a5db121114d13aba3d3fcf03ea6579b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD53ba9b343d6700d35a394c479d0bfa9c6
SHA14603266e4a15967b337bb48e23fc91689e1f12ce
SHA2561de147623959bc2ff5a9eb76a4c46b84ecb2a53de91898129908233fbb021902
SHA5124b55decf39d24b95425e4c2a9422277521c7c9d5ee7204c811481fd0583d21f5872b7fa3ccbb3d3a073f135c053b92d9c2076032b835e802fa47358fb53dc0b7
-
Filesize
437B
MD56f0956b7320621e2add229397b16cc4e
SHA187428f0d0ee271f3e9edbb647569ffd17e6539c0
SHA256a0c000dd88d7120fb62fe5008e6b6dee6a948e93cbe6fad152ab227bbb04f71a
SHA512d00a4b80c6ccc972a6c4d35e1a4739f49e4292b33ea83924a7a3f8a0a599fcf6714da0431bdf7f1f4a351febb000d91f63e010ad0d8070163822f262bb5bda99
-
Filesize
5KB
MD5626383313de8acab47dabce887e27c5b
SHA1b583e5940b3d67e4cbb2372ac00457d99078e197
SHA2560497be6d54e6c978a08a1b0acf785aeca3b9c0663ca57a12cd1226951396e272
SHA5124f1d5848263ceb8d27b46a0eb28e1a903c0c34e2b565f33d7ef396e50bef361e0a1acb3054deeb6a256c6fd4b95adcf22ab157884c9c69f7855a94731469d41a
-
Filesize
6KB
MD57224fd8688eba64ce6aec140889375b6
SHA137f9f344bb73d3f8a68226c9297734347a8c51a5
SHA2567eb6f877004b45894567192d7cd8806dbc7edbc329a94549a683526320bcf1f5
SHA512715edf1aa16fc3627a85247e5e3479215f65409b83d360b4a3a4f8eae7ebfce791de5fc6f28c7bf4acd4c488ec66140f91fcda6b416ab160d142741c1ebb2247
-
Filesize
6KB
MD54934016b4d0eea167553675dbebcb80a
SHA181f1f0bc06e615e3377037ac381850a2f5f645c2
SHA256b1586af741608964787cf54c82ceebdbe45e54f8142ecffd47a45e5345969f8e
SHA5127c60cfc14470df339fdc058071ed9445e18083564a4bf78d5987fef26db007c6b6f664c976bb4b5b5af97b7c36f2a77a9b8e35709fbe0fff4cb1e2271a7be156
-
Filesize
371B
MD545583a2cb646e2b2f3b1d4063f67791a
SHA1b71285f7a5a2d11c022c26ff8736dda0e39854cb
SHA2564bdcc5ab45b8186c0d4d7c4c0ecd4c71bb08aa988f2bd8c27823afadd86c1fcb
SHA5126cf00526e0cc0a4043fdceaf1ff5cd386c9bc19ded05c7b41dea7afb2a16fe91466ee82646d77e1713d00ea3906c45c48b28b350f28db86c0c55c6eb7722408a
-
Filesize
371B
MD586a2bbe91283412e381e492c81110f38
SHA1996aa57b4808a8de7b6f13fa1127ef317bbf5f22
SHA256c10f1fda7b2e953dbbef4aa293de43683da1a6ee213c103ff4c635c6868dc25c
SHA5121e5c79cc645d5d023e2eadc170fbb70bd66ef72e5bc550de11b687000e0536fc1a2eda5ef712e33bf9d421e5f73b9c3a7200a9a69a95b14bf0cc65cc5476631e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d3cd046e653fd3124eb2056e81e18a50
SHA1ca2f524b750fda0e87b16fbba628432aaa8c663f
SHA256c3232544e711e8fe3af66133bfc16ee45a064edee07d412b746ef38af40fc7b1
SHA512f1ad9d257fe7678ffec05f6229349861dfe606ae635b597a3a2dd72208e8f2ce982d91c260dccc79fa9b4af02f949f29c91a79be6ec446302eb55ac12fc74cb4
-
Filesize
660KB
MD53ae4a965680a6b9572c238cb51cd0f33
SHA1850b303af5b5818c8c34cd88ce67acc6f093c248
SHA25651f1e33f84709ac4ff359e47fc0c98395cdb12bd70feb8af78e40f494ef9803e
SHA512328cafddc052b566033bba0e5714c0dbc53e7c442500969a1a556e9fb90d97fb9efccf233ac4632d148b2d6350c54a0e5a8c6d4be5b19b1dcba04b0a61e17bb5