Resubmissions
27-11-2024 12:41
241127-pwtclstmev 727-11-2024 12:39
241127-pvpb9szpdn 427-11-2024 12:34
241127-pr879sznfq 427-11-2024 12:31
241127-pp1hcazmhq 3Analysis
-
max time kernel
59s -
max time network
63s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27-11-2024 12:41
Static task
static1
General
-
Target
AudioMssgTranscript.html
-
Size
6KB
-
MD5
5f8226265e55a1412f69eea0efde97f5
-
SHA1
160197e23952f22229dcb2fa3f02c42beacf290b
-
SHA256
8d54380a335242aac708aae09bbe3dae493264e2285ad3a64a7a78c962eb8f6a
-
SHA512
bb7e0bb1e14faad31b77bdbe26fe69b746e8454146c463cebf004e738a458373d250df2218f9b15ba11c0054a19f693bfad127900841e6569bee5535d54552db
-
SSDEEP
192:9DoDh/yDFDkrQBftDIeoShezo/yDIEDIhDgfDIEDIhoDDIryge+5ID5hydhDDfQn:9DoDh/yDFDkrQBftDIeoShezo/yDIED5
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\deec3168-9a1e-4107-9018-30fdd46ebb75.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241127124127.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 400 msedge.exe 400 msedge.exe 3496 msedge.exe 3496 msedge.exe 4608 identity_helper.exe 4608 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3508 3496 msedge.exe 81 PID 3496 wrote to memory of 3508 3496 msedge.exe 81 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 1980 3496 msedge.exe 82 PID 3496 wrote to memory of 400 3496 msedge.exe 83 PID 3496 wrote to memory of 400 3496 msedge.exe 83 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84 PID 3496 wrote to memory of 3340 3496 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\AudioMssgTranscript.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff99b1446f8,0x7ff99b144708,0x7ff99b1447182⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:376 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7c5ee5460,0x7ff7c5ee5470,0x7ff7c5ee54803⤵PID:3212
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6488 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13342284429500265040,13340447285772964118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:2740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dda6e078b56bc17505e368f3e845302
SHA145fbd981fbbd4f961bf72f0ac76308fc18306cba
SHA256591bf3493eb620a3851c0cd65bff79758a09c61e9a22ea113fa0480404a38b15
SHA5129e460013fd043cee9bdbcdaf96ac2f7e21a08e88ddb754dddbd8378ee2288d50271e66b42092d84a12e726469465185be11a6fafab6ed4236a244524bd60f502
-
Filesize
152B
MD5f6126b3cef466f7479c4f176528a9348
SHA187855913d0bfe2c4559dd3acb243d05c6d7e4908
SHA256588138bf57e937e1dec203a5073c3edb1e921c066779e893342e79e3d160e0b4
SHA512ef622b26c8cee1f767def355b2d7bffb2b28e7a653c09b7e2d33f6468a453fff39fd120cacbffd79ce35722592af0f3fb7d5054e2dca06310e44dc460533f3d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5c3a587d-988b-463b-8ee2-e1a92b1c30e4.tmp
Filesize24KB
MD590cc75707c7f427e9bbc8e0553500b46
SHA19034bdd7e7259406811ec8b5b7ce77317b6a2b7e
SHA256f5d76f8630779de1fe82f8802d6d144861e3487171e4b32e3f8fffd2a57725fb
SHA5127ad692bce11aee08bf65bb7c578b89a4a3024211ee1deaf671c925d65cc016943f2caad3d57b365e16d1764c78c36cae35c3c45cef0928dd611a565b0313e511
-
Filesize
79KB
MD5e51f388b62281af5b4a9193cce419941
SHA1364f3d737462b7fd063107fe2c580fdb9781a45a
SHA256348404a68791474349e35bd7d1980abcbf06db85132286e45ad4f204d10b5f2c
SHA5121755816c26d013d7b610bab515200b0f1f2bd2be0c4a8a099c3f8aff2d898882fd3bcf1163d0378916f4c5c24222df5dd7b18df0c8e5bf2a0ebef891215f148e
-
Filesize
25KB
MD5d0263dc03be4c393a90bda733c57d6db
SHA18a032b6deab53a33234c735133b48518f8643b92
SHA25622b4df5c33045b645cafa45b04685f4752e471a2e933bff5bf14324d87deee12
SHA5129511bef269ae0797addf4cd6f2fec4ad0c4a4e06b3e5bf6138c7678a203022ac4818c7d446d154594504c947da3061030e82472d2708149c0709b1a070fdd0e3
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD5b275fa8d2d2d768231289d114f48e35f
SHA1bb96003ff86bd9dedbd2976b1916d87ac6402073
SHA2561b36ed5c122ad5b79b8cc8455e434ce481e2c0faab6a82726910e60807f178a1
SHA512d28918346e3fda06cd1e1c5c43d81805b66188a83e8ffcab7c8b19fe695c9ca5e05c7b9808599966df3c4cd81e73728189a131789c94df93c5b2500ce8ec8811
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
22KB
MD59196e81f8ed7f223d765423c1f9bc8a7
SHA188f9d5c2a6908cf36b8daae803578ca9e1fd2929
SHA256a4e2bcf7ef3c6c614c2142d3c1fd44caac4eafa86a1779ac31cba164e2d89cbe
SHA512e7d23866fcac017762d2e2f18597124e9147f458d30038f78ba9f3a2bcbe479fe4792573894370ce2d6f93a00401231d9f01955fde351ff982a82ba87a8241f8
-
Filesize
35KB
MD55009982b60a0f93eac4c1728e5ca17e2
SHA1c0f932d333b91a4b971a52ce88bc96320745064f
SHA2562ffc0ec332938cbce14008ab246c3d918800189aece932e92bedd8adb8332fe8
SHA512401dd0a45c177130628787b92a17642783d27b1a977833af4110d81cbf2572a159a371beb473baa07ad38ac8297551aadadd2ebb80401a73acd580fdc03964aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5eeb791992c2b0f2fface7d57e6001cac
SHA13a11dbe23409afeab6a931c2f71dc7de5e4ac18b
SHA256a5b4b1495beb43ce411f49ca7bbb4a568a526c30e11d7a833958de78e4b87607
SHA512b4ad6b7b977b51b7a9212859b8a8d1cea034e216f46f4680dbbe8b84be3993df5f1e92677a5a74f03b8c4b650391145cb478c8015dc75095d69497b943ec893a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD584a5f00306090d7fadba9db32e0a7bef
SHA177da3c2657bc668efdbe7cf74331e65c9a7e05b6
SHA25655073d19379349186d2f9f432599ad87a787fcc16f073b0319df24b61f14e1c1
SHA512f45239201a6de5672eaeef6849a3f5e76219f99a027b37e01061534ad31886c02b8bbda0d2a48cd6518c084c83fee0cfbddf518285d713e1ebde255428f4b847
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
5KB
MD502924f1e848d96a435baee70ce4ec3ff
SHA1d9d4c7737b91ff39217151f9fec74abb1cb995ef
SHA2567d8311f69c8fe37345cc95ac20f001c3f3d7178d037dcedf90b767db719a6047
SHA5124ee6386a0196e39055a2f65f7ae9f4563fb94fd4a75c38e1215f5bf0304be2764adbb3037a15c2e3e8ed086497be701c6ea93fe1fa4d062e624bf3abd5bc98c4
-
Filesize
6KB
MD544d87615ed2878125dc027511d0610a9
SHA14aa43f097267d9f3e36fc393a77c145880bff1c3
SHA256f09d2ce7c8c5beb98ef5f4f1923276b14715037e1f1fc9aeae3a72608b930258
SHA512f2d9575d9edd5ae10e2face841f64d78212eaf1bec22f8906bda4179c955d2fd832ffe5950d756c8719d920c22922de9464d58966b77c7ee64317bf8692d71a2
-
Filesize
6KB
MD57c423d4d8d98e653c14b0cd6bf024f5d
SHA19a31e12cde61d0ca905b0d3dd034a7975b4ed604
SHA256368cb24e11c44cb752af08bfa8d94cfea45a9707c60c499905a08bb47a757096
SHA512ee5cc693613dd0e6b015a3e4d847746c1bcd5159c65fa8909e7b9fb08d81fd0da6d7456a569a22cb7cb37d3ea6474c187b427bc2cb69df7b874c9adba4a4d384
-
Filesize
5KB
MD59c5bc4a807f542d04f0296bbdf51d0f4
SHA1780da6624273d0a882a5599d9e6b03d1ed958c58
SHA2563c48e49a088d92e524490ee1eec8b8fe2e402467e1f86f96c451909d63f05737
SHA512209e6689be0204f33607c2b42af643d989e12fa82574050be62473941ceee06b80b5cf4e285e6aed24e8dd227c6024081ce7959fd7b598163594b2ceb5ab9913
-
Filesize
6KB
MD58b5b7fa172611a6eaa2e982ce8a3eeba
SHA14faa2131d5c1f0e1d56b2e1296278e25b55948b5
SHA256107dd11d22b7311d2e33eaa488f7f22f7467cc2a90be1b7447bc4d1571801056
SHA51203ca8d5996c59e359cae1c49cd796c041a760b6c4165a9acc6072cd18941274d6f9e90fe364140f19a2a28c33075570a66bbe209a2b0771953749bc1f552afc7
-
Filesize
24KB
MD50d8c8c98295f59eade1d8c5b0527a5c2
SHA1038269c6a2c432c6ecb5b236d08804502e29cde0
SHA2569148e2a2ba2a3b765c088dc8a1bdcc9b07b129e5e48729a61ebc321cb7b8b721
SHA512885a734a97a6f8c4a8fb5f0efa9fe55742f0685210472ed376466e67f928e82ddf91ba1211389d9c55dd1e03dc064aa7a81d1fca3cf429fbaf8f60db8b1348c6
-
Filesize
1KB
MD5caa01e939d44ad3a7bbb8d2ea982e501
SHA13f4949a5e45811df063dde66af68bee9429f754d
SHA256ca401392778d90c9c3b676d878b5dd6f5c337ccfe2b8c1d7a3684ae2dbe1107f
SHA51259ec08382b632e3affaa727d7cb16205de321aee423748bd0fa4b75330eda9069e4962d02926fa6e39d5a80976301b3e302f8e0383f480083cedee6fae17596f
-
Filesize
1KB
MD5a68147226dcf01a3ad6f254db87295d7
SHA13e1c103885b1a28bb3a9426b7066610746f4b36d
SHA2562581094633cc2a41ff7ff706b6e030ba4cdb12fbb114b7f6c4b678f744818d8e
SHA5124dddefbc5dd2a772f6f0dc310383db2c530e151aa52e1c60eead9cd96b5edf52af581d1771a02160ff50f9d3352319ce5143158dd3a8b9e79e80449674429e55
-
Filesize
1KB
MD5715f1ef447dd80d07c583afccd3ab54b
SHA1ac6a4c878d06f89bd2e16999f8f6d47706723746
SHA256af313004589f67a43af70941df85693972cadecba64365fb6b9c4a01101cb35d
SHA512355dcb388d9ed10ee4cc1857026c1de484a007c9f13a0d70fba940f32707394acc48c1316f382fcf533a6b98d69055f5470cb4c2cfbcb099e7b5e46790849fe9
-
Filesize
875B
MD575c9914eead96b78a376508c9175ece8
SHA13fe9daa70dcce9a2421a62d278223c1185f89244
SHA256d4d409d6c217d0f262b0df3e883f76e7310bfe5d92cb95c28690d9ce662bd526
SHA51203f4f7aa68196c12a7c562494b21d144a9a054c9b2d885fb019172533c7d7db2cdf1ec5887a2e4abfc12f5852d8aa45b5fcc983d0468bb0f2aa1311494df3681
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD504fcc509a8f9cb5ed4a486c69778fe52
SHA1e977531b82eec1325cd333c02977b001678bf4b8
SHA256d86c5d0498e2c72864cb98656d0067c347c9b08e5c19d2cf2b62d7d7c31e463c
SHA5127999abcfeb4853f4506dd1cea40c0b6f15244fbd74bfced174543e48946beb2e43a59b360eb60d06dff75944f994c95106cf5f1df8e82b16bb489f816c68dc48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5669b05a3fc8c6878601513699bef84ec
SHA13319d005304c5584c96c47b365b24007bf228aab
SHA2563957b94babf4c35820352cc43db039cfe4db302d6906387c451de3d19186ad2e
SHA512d04855b457856291c20ecc5dd27a4443ee6ed9a908e3356bb444b729958c0418e90bc0a363a1d81a05390c44bb6d4a0b8555c9202b9e42e8ec2e3b90a1bcae83
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD501bf80859118dcb04ae795612659077d
SHA106a22e108d763c7db42d4ba9b810e4c2ebf02f47
SHA256c0a66dca7ac0bf0c6ccaf77c841b79389d5d1245bcc9e6e24db6eae8d237c135
SHA51245add8a720b3cc30a3367cbe3addc6789ee3c0f0355763d46b20bfc3e92f09b317abf1beb1151cd132f50f7ca34df108fa1d502ebca8e723b4f99e56711e88e1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize8KB
MD5253a7859077239a7ad8ae04509c07ffc
SHA1ae381087ceb72d878be7f4956ec8e223e1ea60b0
SHA25685c5bb34c866749a8c8dca043b2502d40fc394210e46a1f484e6f5aad8f3208f
SHA512ef0f1b5efe9c916bb94ba778585ebb674d3801c97d43e9426b7939ca9f87ecba7f44f5f6170d6cb4a22a1f2f7129856a29d919c7db4431d3c516035dae670ca1