Malware Analysis Report

2025-01-19 00:46

Sample ID 241205-snpk8szmez
Target https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn
Tags
discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

Threat Level: Known bad

The file https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn was found to be: Known bad.

Malicious Activity Summary

discovery

Browser Information Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-05 15:16

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-05 15:16

Reported

2024-12-05 15:19

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4120 wrote to memory of 4836 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4836 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 2660 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 3164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 3164 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4120 wrote to memory of 4540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffcfcd946f8,0x7ffcfcd94708,0x7ffcfcd94718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,760787146371371575,10357593388589447447,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 u48431706.ct.sendgrid.net udp
US 167.89.123.64:443 u48431706.ct.sendgrid.net tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 64.123.89.167.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 sharedocumentfile.vercel.app udp
US 76.76.21.93:443 sharedocumentfile.vercel.app tcp
US 8.8.8.8:53 66.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 93.21.76.76.in-addr.arpa udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 kit.fontawesome.com udp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 8.8.8.8:53 cdnjs.cloudflare.com udp
US 8.8.8.8:53 stackpath.bootstrapcdn.com udp
US 151.101.130.137:443 code.jquery.com tcp
US 151.101.130.137:443 code.jquery.com tcp
US 151.101.130.137:443 code.jquery.com tcp
US 104.18.40.68:443 kit.fontawesome.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 104.18.11.207:443 stackpath.bootstrapcdn.com tcp
US 104.18.10.207:443 stackpath.bootstrapcdn.com tcp
US 8.8.8.8:53 logo.clearbit.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:443 www.google.com tcp
DE 13.32.27.44:443 logo.clearbit.com tcp
US 8.8.8.8:53 74.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 137.130.101.151.in-addr.arpa udp
US 8.8.8.8:53 68.40.18.104.in-addr.arpa udp
US 8.8.8.8:53 207.10.18.104.in-addr.arpa udp
US 8.8.8.8:53 207.11.18.104.in-addr.arpa udp
US 8.8.8.8:53 14.25.17.104.in-addr.arpa udp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 44.27.32.13.in-addr.arpa udp
US 8.8.8.8:53 image.thum.io udp
US 8.8.8.8:53 ka-f.fontawesome.com udp
US 34.202.133.228:443 image.thum.io tcp
US 172.67.139.119:443 ka-f.fontawesome.com tcp
US 8.8.8.8:53 crt.rootg2.amazontrust.com udp
IE 3.162.140.36:80 crt.rootg2.amazontrust.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 76.140.162.3.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 119.139.67.172.in-addr.arpa udp
US 8.8.8.8:53 228.133.202.34.in-addr.arpa udp
US 8.8.8.8:53 36.140.162.3.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 182.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f426165d1e5f7df1b7a3758c306cd4ae
SHA1 59ef728fbbb5c4197600f61daec48556fec651c1
SHA256 b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA512 8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 6960857d16aadfa79d36df8ebbf0e423
SHA1 e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256 f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA512 6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 238244ee3382e33377d534e46340c779
SHA1 a7eb15fa21ddea0ab734dace70b6d99f06cfaa6a
SHA256 81b821942ad8a5f564e3fe73513b041146eed6e0f0f782cfa0e9a6506cab0212
SHA512 91dae805adfa13745b8c43352d0d79c3f5134d1be2c37098e9f0b700d767063ba8bb3e03cf70a87703fb5620c4225dd095de376483107ad3de4cc28c52c3f660

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 55d1272f6275ffe242b5ec7254cb4010
SHA1 21f7dc964209cfd893c6b176d16ed27c1dcce5ff
SHA256 e8975fb04d73225dcdc679e178da5ebaf87c2def73811c5d856731c8c6e9a3f3
SHA512 ab1715bfca42536998c2c843e068f2fe6fe4cc343225b4395ebaa7ccfc3b0237a36cc1fb2fab5f81102a35bbd75cc4c858a3618cd674941baa54105c0256e492

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5830d81716cd6373757afed10422b5d9
SHA1 5a578e684f62a1c7adf922ff3b7b06d656b6dd0a
SHA256 c96c8b29aaed270e0f5622409336ef500d106108d1361ace48c0c9f21b8d2370
SHA512 438d600bf36087c45b63466789ec6e284278d9251f8a431cdc4a4bb2973a161abfdf87646d08715a0ba7ee391194e948c5e054f61c62344e7b72e93236481763

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index

MD5 94a6becce25c76d24aa793101794f5ff
SHA1 c53f0122ffd44dafaf64dbf8691be10364e9d9ff
SHA256 7876bbe0bbaa2db05ead09cbefc5a5bfeb18232aab12b4f0dd9e18ac081635d8
SHA512 c7d76a6a8dc2ca8b19de301c783cdcd89e249b0d772308edc5c82352c55d10f1dd3002aeabe952a0340b6fac86e5a1dd1da9956165f5dc91f1bbb38d7fe1d40c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 8d393d21c32c94444e8468db52832748
SHA1 b0c9f363b8ccbe0b28c0aea9afbeb02f6a24dee6
SHA256 605b6f34730ff402231c3936af639ffb68be4984fce7abf0b42dd635663c3a1a
SHA512 10a7341ad2df5142dbba4f4fe8bd0a9e7b02f9190686285737e751d09217a2d42f758fedee1bf0f395777f11ea1cfabae97cb2d3f6295cf86b6014738e5ac383

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 9506c9bbdb9034ea116b8306c3125c66
SHA1 fde132be2e21d28e593dc5d1a18ff515fef4ef12
SHA256 00d990e42fe5654d90ec89fc87ec4d2b920fcf00fac38b22e7f229e676af5886
SHA512 1f9b5f786bd5eeee21b7eada10deaad5e185877979958c4df47872add2b9c4d01c5748c76567de426a9c956f64bf810fca9b8a8d20da56dfc166715a5ef093ed