Analysis
-
max time kernel
409s -
max time network
412s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 17:02
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/drawings/d/1ZPnBC1L3FnvlVkZRD7qPgyHA0XvaDmbqJ2ru-HOqHTs/[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://docs.google.com/drawings/d/1ZPnBC1L3FnvlVkZRD7qPgyHA0XvaDmbqJ2ru-HOqHTs/[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 4560 msedge.exe 4560 msedge.exe 4088 identity_helper.exe 4088 identity_helper.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 2736 4560 msedge.exe 83 PID 4560 wrote to memory of 2736 4560 msedge.exe 83 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 4112 4560 msedge.exe 84 PID 4560 wrote to memory of 1492 4560 msedge.exe 85 PID 4560 wrote to memory of 1492 4560 msedge.exe 85 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86 PID 4560 wrote to memory of 2052 4560 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://docs.google.com/drawings/d/1ZPnBC1L3FnvlVkZRD7qPgyHA0XvaDmbqJ2ru-HOqHTs/[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9bd46f8,0x7ffba9bd4708,0x7ffba9bd47182⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7000 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7148 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6516 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13468362691175911671,16210186331127220363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD531d8a2396aa9ea77f755de4f59b6aaac
SHA159d19ff288c4951293c478a6f4a8e63e2105fac8
SHA25642efa8451262d4446d82e62b9374f4e478f12d2776a45f14c1100e7ae9d8b701
SHA51297441f5d7156250b474f48799b77dd4daacb280569787e24e6bf38f0178cdc68027ac5496bae30cda5778c33305725db72157784ec39b3c6a80a6c9b3e1bfe72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD598cbd1b01eb1a15a229880e8b912fc02
SHA11047ff63baafca721189e8c83f8d8941b566ce63
SHA256881956b48d577c6a73c3f7a726833c3bd0a9b90f15e55f6e0ec6ade9c64bcb25
SHA51230656deb032b8928a6ae86270e3d89d8be0f50a35130d48ec2894537a157ad82137ddb721700fb418e2e903f547dfe687fb63c3b3672145ac7c66cb61bc5d3a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD50733f110461508cee2adef220599e0ad
SHA1e3838fc3b35327900d6536f82f60d8c3e85a03f5
SHA2564114417df00becc5c6702e8ab6bdf99b4bdc25c5e8875d45c93632b2798fcc53
SHA512c8adecec6b21bd9e0a2860d1041429b5f85d9eafc16e2cc2dca3181520b0cc54114d3458c624feb3262f8c8b9b7295df6c551bb88a8eff0840719429ede764e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5294aa017fe6a453c966ee81a03dcfd73
SHA10ccef1ad205917e466ce40f7611a5cedf1b527b2
SHA2562329a168795e0d73b22d4c7ffa16efc5b22054a67d55713e3a79df15bdeda9d8
SHA5126b1d1b45d7d04b6f92fe1cdff364c14bff19cd4dea4fecc2457e3774a3a95ae5af0e8d1c69f6b5759a98a278513feb6f04acd68f639f5edbd1631028e0ce5fb8
-
Filesize
2KB
MD552f21cd91d246222ca4d05742a53bcf0
SHA1a7f94ce7e54247c610bf2810e828add908233819
SHA2569381d477f355094e01f8eba63113c607cbebf8a466f64bac3398739160056ee6
SHA512117a077ff9c125ba8253716c20255215a9759087fe8eac5b710e94c1adab73eb31f1bcd1d95533f669a6c6b21c51670024217d6b10dd287aed015678fe596240
-
Filesize
6KB
MD5f581f94216b6972472f47069a648560c
SHA15c73cfa548cc814b7ae26588c83f9be04d49868d
SHA256cbd764d1660b7292782ed3ea68aa3e0b9078c158b015b87cbf99d4e02b15ede9
SHA512cfbe15b8c58a10013e7e1029490db73c170ef97214ae7ad4a2a907a625036f0e74546a756a4c39443023f9d8d1189a5faa86804a022ec832ac729f401028f944
-
Filesize
6KB
MD5dfd47718c80be0198ca63796d73b4ed2
SHA137c3b79fcfbea36c1c73e2169d72e546751eba03
SHA256fe59a4c665bde4bf9d2f942eca8f4155ce0490a3fb11e9ec4860ee0c2013faf6
SHA512eac23b7d045c0323b59efac73f4ddab837d97faa794c4a987e9bbdefe75df2ec606825daae2f32be8077b1ec5e861c4e5726f5dd5eb25f682b1f1f93a22b6281
-
Filesize
7KB
MD5aa31859356ff65ff5cdd11911c765a47
SHA128dff768f831e3c803e2b01a4e83e38cc07edd6e
SHA2569ea2d54054ffa1f148bff6e8f28481df00908902b37c6a6a3788e37768e354ec
SHA5127e4951ecfeadf21bf0180de1460541d71250e5e62a1a04c83fc18255bf9c446b547c3bdcfc0d74615dfe919ecc44207988a1299f5518c076fa2e7c6f3d624828
-
Filesize
5KB
MD565f71c7ab904165db01a95b4c8242715
SHA1f489af133da7c7886fe889a8ccde77283a7ae3e3
SHA256371d2eb205d7a767af6dec061d8832b37a7aa1d1185cd04f71afec630ca3c246
SHA512485c3fd94dade7077f7b9cf8468005327b47cd8d92bd1b1566c0173abf720893b2a13d171e48ded55aed20bbdda3475d493a3fca2a17e862fea724076fcc33d2
-
Filesize
1KB
MD541f5fbad3bfb55e947db97f6c6d22fce
SHA17f58399cf5250cc3508cee97f385ea761c2deedc
SHA256c1c3bde17d5ad945eb4cc840aacd5e0710a5db1d7fdf114d720efe5083d7af78
SHA512b658ca8d46a388b25d1e61f19527c1abb443513b83e8208275a9553d3113ebfa88ebe9cdd833b23e13bf9198697429cc76ce420be6a72da747c963e364164181
-
Filesize
1KB
MD58c9e41a260f6cbf9b42cb98d0f3ec5bf
SHA1b6adcdb3aa11dcd5bd3e36fca941087ccd67e350
SHA25661a8ab9848b6fc53b442c61f10ac520c936b2bd6d1c64a136e74996e89fff308
SHA51201d47ee86f7d3fc70af6af93dc318bcd31860423a0a448e8dcfce34ee9d4e87479b74966d0ac05a2f1eb510e31a7abedd4fc828d57f2c6dcb1594932953be67d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f7b53dd6a9426c2de14cfb01d069e266
SHA1580946b784eae6e2c978dbe0518eaa89e00b0735
SHA2564b0c45b95e7b25981fb9adefd5a09571e996b0f289b3c31279c41369dfd4dd77
SHA512e1481c52e46f0a6ea316405a03487531b9ee36ea2fc330dcf8c28bb17c7647f1183079f9c67d4e382a1947be81ddd5338e6c29634deb6fa1337e3940f02cdcca