Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
96s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payslip_Amendment12009.htm
Resource
win10v2004-20241007-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 1208 msedge.exe 1208 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 3492 1208 msedge.exe 83 PID 1208 wrote to memory of 3492 1208 msedge.exe 83 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2524 1208 msedge.exe 84 PID 1208 wrote to memory of 2012 1208 msedge.exe 85 PID 1208 wrote to memory of 2012 1208 msedge.exe 85 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86 PID 1208 wrote to memory of 4760 1208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb566e46f8,0x7ffb566e4708,0x7ffb566e47182⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1332 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15232182689419248604,8242303039101304322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1892 /prefetch:12⤵PID:2600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\07b04fe6-38d3-4945-83c1-78268a22b5f9.tmp
Filesize7KB
MD540410f9850f66f272070828ad7424631
SHA170916720a579d0f0c4b1d8abc383a2b707697be3
SHA2567d38aa9707d47f14bd6f4a3535f17cd80a7f0cbcd8dc6d00863b44f24e4fe917
SHA512fc874729eb899190fda6ce313ff2f758b7362fe48cc94698347103643aac35432e5250309862d06a3ad4c000684039efa1a1287e8b3a0ec2747082590efb64e8
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD530248e37bbca53a915fb5c763b0d6ae7
SHA140e4ec2296c958bd28f24137bca5f74968fdff79
SHA256e1ebf5083ac113571f05417a4d5eaaedbd9e71966f6711423ef1285d762b2081
SHA5121130dcaa0018b6d40b5aaf0792a4fe5f5682de516607af090ebee01f108bd5d68bd47a107ed73c9c95c71b0f5e16ad949cf6a0ccce453fb65d6ce2881dbd2686
-
Filesize
1KB
MD500b45224d742e6108261b654b3470564
SHA1a4e2288b50eb7c1a2fc8eee506b7156b920d4d69
SHA2568ca69ad8e812458280b78812e3ee2b06348cac0809d07d86cbaa0dda286488ef
SHA51211c11debdf317fb1ba8301b76f6fbece145f049caa19146c24cd201e647b524c79fbf4028bad876b91894c20775bac35ad37b1ded460d5b5f4c71c1cac73ea4a
-
Filesize
6KB
MD516ecfc712abcc7dc472a66d3fcfd19d2
SHA1282a51b516292a36dce8ef424f3ef8b15b4f6812
SHA256ee8f1ea00e892deeb9fcd58f68c7250d4012e2e4b328f7f7e26bfaf569a6498c
SHA51291a01b1b0710a9e7499c33183348cecd7540a0af067b350cb50ce0370dcc60a68c84b2219dc7c051c4ca63aa3261cec634f3d446fb2e8c4719f7291cd0d64d8e
-
Filesize
5KB
MD5dde68bdd654f01d9711b1678c891f015
SHA15241d920eea50d8b494cc8c67f10330c21c7f176
SHA2564c9e80dea8f0f929e4730b439aa2ebd21fbe18bb2f77818480c6ab241a9a6310
SHA512876d4c2f24ae678aa7d3dd473369eb4728133b8e75a573b57b51bb79a5c99736ebb61021aac4e14581464c7674513f1bcb451b0189692975ba9355306a2e638d
-
Filesize
6KB
MD5c96d75edb1c6f872614fc2a006397441
SHA11325cf7804660e635cd831271ad95f06d08b7004
SHA256bc674afe05ea3b0b67ef78f5cfdd61351465107bed3f847ed34912c8c10d3bb4
SHA5128d1c40b07890f798941489d90ec44e6df5f42227ab6aa1b7fbc727c9659113b4b77fcef1494c4b6f6e17bd4feb180b9345f8e6328003290cc63bed51522cec27
-
Filesize
874B
MD556cf5359c84e0408f950fab13d658e8e
SHA1cb024d05f8e4f7ed88c16f15a302d6231f099cee
SHA256799888c7dcc51886f83c1efc5511e222e8a23d779091c3298117c4f948cc94c5
SHA512dfc9cbe46a3c9b45ceec081c0f4be78d66304c0a3f8ea9388cd28af5505c55fbd327ff4674839890ac42daa61322120f78e5e2481e0aed97e691b2b131ddafae
-
Filesize
874B
MD5da363f1baed2ad15d987b348e8a2c879
SHA139e945c126ec27028c8eb6060f93e5374474854f
SHA25608e49f67fcda1bef98eb5433154d6b1ac4aa059abf09ce335e42ed81a129153b
SHA51265698efb80f4a971a2adfd2afa948d72aa0c3ba6d2043bfe1c7430df6eb2aa81e64e440eb6b53286ac754c3cf8bfc5fc2f9cc9aa697616fda1a618361f638704
-
Filesize
204B
MD5adf1afdfbe3ff90c562dd07cf620fcf6
SHA1e9c32934e3866f7c166120c388377f20563e7808
SHA2566139a0675fb23639314db976663c9de7dd0278e0907bc4d8c3c425239d964471
SHA512e846ec08c6571d072ba88efd96418c042cc07b4ea463dd10703075e877de20a79e77efe0e0173f30afa17fc2c769a0a9c6645b6d29228ef873062561eff366d9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f8b587065200327c4d3220994850a4f1
SHA12baab3377c96ebb46cfe431daccac205ead7da90
SHA25629e223ff0440a12d5653057cbcde472480bc23c1e56c4eda20bae1be00877df3
SHA5129781bcc09c1df70bf67e345770453c314e7d025dea03f55172425da8c36db50576effc1a5fe557ff29977fb41e2a27cfe2badadd13a1939c6f31f7a2818aef1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize12KB
MD590b3028deb0d5279d8a5d1640dc533a6
SHA1c37be6f18c0f16829af491f9c9bf5e4e7359b9c9
SHA256df1dd4b83dfade6d477331e69817ddbd874d80a82d8b1e7ed88d886bb3ae6350
SHA512958c5833db2b2d0abd761fd4dbb81ee461f8e23ec4197cd4e9815302c3d27d8184f5bd9129f465de53322accffdbd192e8af103315cf676eb09d8c7e2840961b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize14KB
MD5525548468d4535deebfa78af3070728f
SHA109adb84c42d9d5d58a3c10c70159fe5117b4fed3
SHA256889c1c57628f418f564e028fda9d2f70e736a6fb4a5cfbc8e7e35d98a56b7484
SHA512d785840d19547cc4aede1db675dd1c7e40096b99d65a83508e2ef5bed15c03de1b16b650c889902f54ec6efb1f27d29635d1a6f90755bef120fd9020301c6870