Analysis
-
max time kernel
438s -
max time network
439s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 09:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/Divadlo-Arena2111
Resource
win10v2004-20241007-en
General
-
Target
https://t.ly/Divadlo-Arena2111
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "4" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe100000006a4174df9718db01959b97fda218db0129d4694fc53cdb0114000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3044 msedge.exe 3044 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe 3456 msedge.exe 3456 msedge.exe 1800 msedge.exe 1800 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4720 3044 msedge.exe 82 PID 3044 wrote to memory of 4720 3044 msedge.exe 82 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 116 3044 msedge.exe 83 PID 3044 wrote to memory of 3196 3044 msedge.exe 84 PID 3044 wrote to memory of 3196 3044 msedge.exe 84 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85 PID 3044 wrote to memory of 3944 3044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://t.ly/Divadlo-Arena21111⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd647182⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7096 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,3509561465604512867,8802826873354990958,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:6080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
1KB
MD58fc9307e517451c663a9b8e9659a0dd5
SHA19f2454b531eb2c285079cca9f396ab5befe6f97b
SHA25608302a1768dcddbc5127d094c06c6d32f7e8c4b28e1f2307054eb813ddbb62d9
SHA512be20b67c45b78fdd96779379861b799c788b332add3944696fb9201a59916238c56e454aa5a7f2cdc5542e491cb575417d3c6e8091343a4f1515702481cd94b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5444b2e710587084eee11c819fc837ea7
SHA18871ed21487fdf7a62ba7438474e07f2cf97d80b
SHA256fb8d9395ed6ddba121c8610a0b284d8c2c0da23a0c98831a791674cf7c98d5e2
SHA51228771c11766c54e6754549e49449620148023a29583b0475dc41c6751ae43fa745029ba50291726157f0f6349a7dd7cb30b575eb16bb6de335bea667ae2bf666
-
Filesize
2KB
MD57e1bd676bce6c148bb980830d0720ac9
SHA1431f442fd0f3f214007e196c8a828b1d2d06427d
SHA256dabaaf6e084101820fd75631d0eb4ac249f514ee1423a56269e72193967aced0
SHA5125bed58c1dca90e5dbb3291e7e979741554f8c72535192ac2e72de20cc3ccbcdf0271df9bb63d766a159a627064b8a1c21682a5c7864c2e5848912ac44f03a803
-
Filesize
2KB
MD548dca87eebbb5c9bbc2af8f3ef54869f
SHA1e4e43f28489f18658fee6b5496a122a44dc4dc0b
SHA2567e5aaf53461cc17b91f6cb155279790b98c15a3696edc199fa279012d3194130
SHA512aec361f66bdef0994fc90d3e013ebf8bc45859e78e9d5566d1a1df6c0e6b495bd69dda01cd244b8253081d3cd1c0b4ca7e306e0fa6927de6510639edf371956c
-
Filesize
2KB
MD5704aa24fa8ca3dc1b6a127715a82ef5a
SHA1c18cb6c433fd17a02f721d7cf3d5dd38f2a408ff
SHA256aee683262a5fec59329de0ae8d7e6e2a75afeed942e53cd45a29f4d066c73a3c
SHA512057cc34b7164eee8cbd66472621029d9871c323f4deaceab2e133447ae0caaec0d7ba21901b71300cc5aa9accce83489fb502225208442bb898eb50555de60d0
-
Filesize
8KB
MD580ebc052c97348c3f96693976274a630
SHA1966b8d773df7157417297bc9130687f2f7d97b99
SHA2565857f20257ee56f898109e8e0a04852f74aa9d1d53b9d352716e04deda9d0b69
SHA512a9b7f63a016c2b618e3b4d927ea3f93b2b9ad6d67363826b58af37ce72201f0d0b67edb1ec9515f89dd8a13bc43f773ad5291f102dcd9242d9fe8c5eef7b6a36
-
Filesize
6KB
MD534f5a41fb8c7ec98361d40c31868f322
SHA18ccefc639e98b56beb5e38ed9912b42ce3c7a9ee
SHA256beda5cc0cd56343b36811371e88416c75b036df8d10f25d1e18da7e107180195
SHA5122f96e10d911d16c61ac3303805757d213534fd3c4308ec714729e06b7e9d4244b683238eb9a7ca3bcd680d5c62995dc18e4d56478ed83a64a88a174cf53d8a4c
-
Filesize
8KB
MD5be9a129efbf328c6389279c890be1fe9
SHA1ea0d19bcc4b5b9db31a3d12f11a6df85201de9bd
SHA256c734c2281fa7a28cc6da2156eba1d9777cf5f9d10aa18ee2e139e279fa31cd71
SHA5122618ecd565cd2b0f5ac7aca17c67953ed4c24486d9ee3ef6b0459b8e3dc4d854ee7702f561c26159ae55beece7355f260a320c8339575b97d0a8286f1191c9b7
-
Filesize
5KB
MD5b4f7db197cbcc7fa5e217d55e5717742
SHA19213ccbae8a16faf616486a849257d272cab63bf
SHA2565b3ae8d1b2f06cb285fb1fe07187b473f7d7aff2c8854fd3820515d677700bf8
SHA5120ff3ba4e77b88e91f356b9da5db447ba1ac65db20124af94d1bae14018cc318814347525be0061cd5643749833e1aa2539f6c213481fa112b5076f38136b0bf6
-
Filesize
6KB
MD5e793040e0878ade074d50b2947d71dbb
SHA15c0f5e812468bd56f3649df3865f5cffacdf0e33
SHA256517e4c84116db51ef714a204c8056e836612d4b0ea06a0a776615e88577222ed
SHA51282320dfe2f9b860aa2c2be9d1c433e669986f1ead594f06245910cbca8fdc351fe49b0a5a25779b952a0c5e5bbb6ec0f452b80828380141be1e4b3e0fbdd4c57
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5be3fdf8d4cdc4196cf60744491955f9f
SHA13a6733b9f080999be84836920da65352432233ea
SHA256acc8541d5aad1db89848aa1b8d2f131648c4cef9dbb0c3bb9206911c2005c636
SHA512f12c1831efc49e3b870c8f5a07fabde5d69fa5ab5471d7a7d830d9e286ac2a2a1354dea2ab9e9bf315c80c6f674f71abb6e77312afc7b6c6eb806af23f627dfd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58467a.TMP
Filesize48B
MD594374341bbeb7787a017f1284081117b
SHA1e541220ebb7e27c20149917ec262186acb45a5b6
SHA256f737e5483bd5002c02630654042afb42341ea01c4c82ca15668cd5b65b09ec5b
SHA51273387b4207e3bf8bbafabe706be574dcaee6ce0c0ac28b78e30dcd9e3fb646edbc0e7ee2966fcefe37aa7a58f5c7eccb1ff646d3b12fc27045e904c1d12d95a6
-
Filesize
1KB
MD5954304c7f4a6c440336595788d165ade
SHA1d21bff0cf5b30b76e5b5004f8717db5f4d03cc8c
SHA2560ce98de635c6be088d4296df6fcbcdf91b94b595624fe2e6684fe979f2675d1a
SHA5121af1b6c538d76e5546ff9434919761c33902e79443daed56d20b75f2ebd37dcbccdddda91b8898222a1059458ec7603b2ed76e5606249d34f16a7bf036d9b966
-
Filesize
537B
MD5119730ae52ec058f5b0dc694d91d0a9b
SHA1fcb892627c0cfb96352fc7927e5ee3e1c3a4c7ae
SHA25621f9de06b7e664263f44640d8d0ce003aa1517ba2abb57f0eabb7b48628bdcf1
SHA512498d2555399c031d62ef5050130135b635688086fe1d4c6e5f07a252e912764c204765fd2467e3fa153ecc38af99751f2cfe6411d3ea7a6d7d652b50d5cb96d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD568347bfb9e0f4b4549a0a7c2df8238e9
SHA10bdf70ac6bfd9f3640d844dbbccdec278dd523e3
SHA2566c2b82845bcb904e49769bf085e580819078cc843ac67535ae9f8ccb253212ad
SHA5129c1a6052656416a9024cfbbb22672cc919a9c897cdeeea416a637baa88b21e8e17b5af0a73dc819383aa08c9cffba25b4436065518b1060b44278060ce960cc5
-
Filesize
11KB
MD54da482c4adee678c04f5f61095501a6a
SHA1d297a566226e969aa03b49122cb805344cd7912e
SHA256ee769a2ab8eec0a8cb6bc9159f59ea071b3f0e0ee72dad0e8d609cfa0a842dc7
SHA51211fda97fe849af4c78015953ef14868ee48d5ac024d59f82e9b8c503389614e1070de1f4137a1bfb7d0014299e92d712eb59c7d3c35131a04ce1c148cc59c52f
-
Filesize
10KB
MD51b778aa87ff35b3f9f22a8ce61b4b198
SHA1deef1e5727639bab099b5373a35c6717049354c3
SHA256f8ba58a41e7e8f4ecb0037cb90de198e262f2f44ab6738f289ad9f4c58573875
SHA51256de79c255bcf64169701c96c1cb52adef04607de039f80aa78b6a478480d25f8faa3159e2273d2bfabf11bb62b1b5667951f1b47ea769df4367ada57842b721
-
Filesize
10KB
MD5e4202a63d1123c006ffb76cc9ac5d854
SHA10f64d59d4406e88bcf8a1eea7f9ed2cfefd889b7
SHA25631cc78dc097b7c95caa84dd3c0316f75aa9079995d065aa1e7a01c5136585020
SHA512857fa5bc6ee3f3e6c2e5003d7bb771a57b6acd351af600400157c206340546cbf1cd14d60c71c73c7840676b687f0a3b45e177b06040e405d8b439d318cdd8d1