Malware Analysis Report

2025-01-19 00:46

Sample ID 241205-sqqw3sznct
Target https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn
Tags
discovery
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

Threat Level: Likely benign

The file https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn was found to be: Likely benign.

Malicious Activity Summary

discovery

Browser Information Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-05 15:20

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-05 15:20

Reported

2024-12-05 15:22

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3352 wrote to memory of 4992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 4992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 4496 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 4496 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3352 wrote to memory of 3268 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u48431706.ct.sendgrid.net/ls/click?upn=u001.0jtXymQrrP8zUA-2F-2BsChJQ8lprVbTFv4YX-2BokjfrITU0Y-2FWzLEyvng4u3imI-2B2sbASciNnh265TjHL8bmKWdg2vIbJAlJsx5jq6JVB9nipZcfPKdTBaWesbk-2F-2FgTJ86p1aIzoQduqmccpeRA4rHjHyv8fUbJYSkdOtbJ9YWc-2FjIlw2JOPhjC3LbKxrIpGUZrnRFtVcFUF-2F0uHsUfjnAzOsqG3ilZtyXiU-2F6cTlybGWnXNKfp0qQSsUEexX7xJEDvGaTYRRwM-2FIzR320AexC9-2B4dtxlaW3ZoFQ92wqsU7B3iviU0FQONyLlQ-2B-2FWSDdeyRP7BVDc9wbSa341kus1LMNEmVI8Zjf2qtdZcYgixpQXY9WHsi5b9kSypaoWvGZqbSc3cdcWiMf1mpAy23QcgwRRrCjfsrzLsZFjE-2FbAkjCgQWrCsRlz91Vr4KZyHOue9kt5lJcsdTPdw9sx2Bvu-2Ftg-2F6ngDmR-2BPQb5hL7xkbR0-2BOn6041L7rFHHBezXb7c4ZgmqtnL9V8Or82JE-2BHhZoDIVwjtnKROZkTJsxZoOdwEFM8SQSAhpKbORaEZeaxrx9X2zmFn1nQAON7QKGfPRx79MqYVqflhfc-2FdzfyIJWInP6vXNWgb1XU7GbkqxwAcRM-2BiAgzO0AsP6qX6mTRhPVYoaXr1PzteDcCrF2S9t89x-2BDj7a-2B2yJ1nBxJHKtC1TVvUtV9LvEGTTdr2VCUiYKiyuYVbufGL-2FQWllhme6IZm6K-2FPasYtIHvQNd0IAoMMmayWpDZeG0238GYeR2lwwq-2FoLugqUu-2FXJ36JOTxGUD3T1xBXYZBAAVwjPGRZf0ufWFaGXNEjO8b-2F53pkbvf81PTL-2BoJ24-2F9pI02MZGRJWo9Th2Ehu0gfcDmlaUb-2FgCGsUIQEmg1sdGc5FT5V-2Fda6ms77RA87mXvlaqjdWGTMvAne0Auiz7d2LnAuwpVcNA4CJN5I4Uop5a7AeGCsIkNTQZ0-2FKJ5BAurYzLKvmEba1nEt6K4KA6Y8nKd4RC3xQUGcjOn7uQEUfJ3U0WgDEAZZpieQxEQ7UwnMw9xWr-2FxnNw0MmewvOsQGuEBzWLP0CFIY7EDiEbCRJznGKtnN5IJwXn1PU77tnjrFCA2ekk671eyclQnPm4Im7DMFRmvRzSjJp4MqKeabz8vB2cUTOm-2FA5J8jdz5-2FF0ghw9TkSQB4gci2CE-2Fr2zs-2B1AaHAvS7v2FnFs1iHhvjEv5XauSP8OZFVk57Kzw3Q7O-2BOgppNJyFIse-2FJz-2B66UGRUjDIdsIaRh7kxAvCnWG48wKC12EoGhSmD3EYjNAq7fpohkufXiAwe52ymJfe9tm5s2Yc-2FATiaiV8m4IlIhOXS_XOkdRMx-2B9QZGLuCdmWUx71VSlWTKMAHZ96QJAx6HQ9UvZ-2F5kMK3EVUjKshM22IqKMVUePKd-2BNCcPj7fFDl6GSUJQOKkRNwvOQ7Tn6JS-2FUZuEqV-2F2UeYk74dnDQru0QgrDMqNMR4MIbUQSATlDzCPa5Rqp82PBbE-2FUpjdP6cV8hv5k-2BGKpiNrpeduxgN6172Utl6G-2BsvCc-2BQhUY4xr1yX21LFODOmVoNX9jWoIpQOmGe5HeBilvNyhYGTHI92W-2FDUZ-2BuSZe2RWU9YPHOXyvNLDObkAIThFj5MQcT1-2FJQ8R8p2zgariCkNtbGGPFNiJRGVpkgXGnQRaGM3IK5gWRJ89sNe8hSqk0cW963ID5XowP4jThQOuZJHPycCjAlIO96qIVSTcZe5EB-2Bld67OPf0DeZQ0EW0X4Tm2HanzhCYr3Ee3VcHyYScdV-2B8l0zlKAWFZ4rC0f4pHtvOPQ9njkYAtdY4fC5UE-2FCsy4Jtt5Gz-2F-2FolHHzxHmqeXzYOJFAUvxK5EmcCjmHsote7fxdQFTyl-2Fs41F7Tsd6j3CSrMFnjxZ-2FKbHQ6RVgvFbCDMG32c2k6epv2ArFEAaZlXHi9o5CNPMsZGtTyRH98lM7EHM3kW1hurrSyYufB7S8UMevBJtkE-2F5gRPa3AVj0ZpR8dggwQmmmcTUistL9LjlQ-2BNzoCDKrZxdJJS-2BMzQrOCZjaUT1s8L8qbG07GWskMbnVBUxdjZt5SirRinHLlQ5Jsj6tkloLSJkuF05xiHsxfoX-2FgmghaFz-2BNPEx8Q-2Fx-2FyvcNJ0bjcA88NfKKDrvxOODd1GoHy74nVxCvXD-2BLWQTgkuBVNVNbcaFOeTOX8gdEDIhVF6E2gQBaaynhj96YLuKpqeO2QBmg8BnErOMVpwK5Hhp8Wrq3Yn

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b17446f8,0x7ff9b1744708,0x7ff9b1744718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11295990444726458337,10646126419337010921,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 u48431706.ct.sendgrid.net udp
US 167.89.115.54:443 u48431706.ct.sendgrid.net tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 54.115.89.167.in-addr.arpa udp
US 8.8.8.8:53 sharedocumentfile.vercel.app udp
US 76.76.21.164:443 sharedocumentfile.vercel.app tcp
US 8.8.8.8:53 2.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 164.21.76.76.in-addr.arpa udp
US 8.8.8.8:53 stackpath.bootstrapcdn.com udp
US 8.8.8.8:53 cdnjs.cloudflare.com udp
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 8.8.8.8:53 kit.fontawesome.com udp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com tcp
US 151.101.66.137:443 code.jquery.com tcp
US 151.101.66.137:443 code.jquery.com tcp
US 151.101.66.137:443 code.jquery.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 104.18.40.68:443 kit.fontawesome.com tcp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com tcp
GB 172.217.169.42:443 ajax.googleapis.com tcp
US 8.8.8.8:53 logo.clearbit.com udp
US 8.8.8.8:53 www.google.com udp
DE 13.32.27.14:443 logo.clearbit.com tcp
GB 142.250.187.196:443 www.google.com tcp
US 8.8.8.8:53 207.11.18.104.in-addr.arpa udp
US 8.8.8.8:53 137.66.101.151.in-addr.arpa udp
US 8.8.8.8:53 14.25.17.104.in-addr.arpa udp
US 8.8.8.8:53 68.40.18.104.in-addr.arpa udp
US 8.8.8.8:53 74.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 42.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.27.32.13.in-addr.arpa udp
US 8.8.8.8:53 image.thum.io udp
US 8.8.8.8:53 ka-f.fontawesome.com udp
US 54.226.114.88:443 image.thum.io tcp
US 104.21.26.223:443 ka-f.fontawesome.com tcp
US 8.8.8.8:53 crt.rootg2.amazontrust.com udp
DE 18.245.31.80:80 crt.rootg2.amazontrust.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 119.82.161.3.in-addr.arpa udp
US 8.8.8.8:53 223.26.21.104.in-addr.arpa udp
US 8.8.8.8:53 88.114.226.54.in-addr.arpa udp
US 8.8.8.8:53 80.31.245.18.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA1 4d16a7e82190f8490a00008bd53d85fb92e379b0
SHA256 1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512 d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

\??\pipe\LOCAL\crashpad_3352_DYSSCCQDSMLOZQKO

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 e55832d7cd7e868a2c087c4c73678018
SHA1 ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256 a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512 897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 58f98d3c7e3ce8a66f5bf4cfabdaf677
SHA1 eba6d9cd25abef7333916cd117b1943a6b096054
SHA256 deddac17fb5577d93fae8c6ffd1b8642eafc2e954eee8f0943bcb586c9184f0c
SHA512 861584458a01c92d14fc34f78a5a32637dba243cbcf1b7565aa62b9f363bbc15d73b18ef458f76ed7c57968979d6d0d83f58e9b57a1bb15e2cdf35ac35d3eed5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 1b152012a204da1cd492c728ebd25aaa
SHA1 9433f78b7d3c3ac64ac0aa3c229b542612f15e0a
SHA256 434ff13f380904aa2b71bf2877e3be3649fb036b9a586e9ea5cc382de7774b00
SHA512 e3f3a2b27084349b68bb247013c4f4f421fbe1caee68ed75adad7634da48ec7aa45abab9d988fbc922f10e315e9cab2b52aed7ee5318f98667f5e6796084a6d6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 539ecf22c986bd0d870b244226369639
SHA1 eaacccb562befe57fd6681160a36c15eef4f853c
SHA256 dc4280c53f008a7139e7a7f2e9f9a4ceb681400c927e31bda8d123d0de31cfcb
SHA512 9c9133cd8cfea2bd058eb62eac3e37375495c7f285a0db99a5e534cb971f8e6d77646ac51e6c746f2c18ac9ca18b2af44d678eefcdf8a13af9dd6b9f676cfea6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index

MD5 cab395be8db6872094feea181c1d3d59
SHA1 f3a30371f80fc1170982a7ec9f119a6ad501ec99
SHA256 ae8c72a4579712002f14b56a47cee5b9b1c1fa0bd346873a70421f57fb63bbf2
SHA512 b3b259fed0da7a1d87fdc59b16ae553b46227a28a36c32a21ebb73af1159fc3240ca0446de27164433b9ee66a2d6c0e2975d7c782d47eec762a187a2ab49e081

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 1a1f93584ba681be8be27736b3fb729c
SHA1 07a250645de731961d9679ad1aa9e52253e20056
SHA256 b0c5eb0684d9da8eafbf27a908befdf06c55f77a47606a8edc3cc9aa62ff7391
SHA512 63f13aee94fb3e95b3687aad442c2fdae860495c082fe6727322facf292b76c3eb1adef3df29bd16e32925a6f61fa738453adb098661b90806ae006dbccc5627

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 10509e524bf7b751f901cab0a8ee474d
SHA1 1b277df57bba279562d45f7fa65942d542fc2f22
SHA256 421568de53d3f875d7e5e76a53762879f7792f198a575863d8dc133be7c24f2b
SHA512 7fc45e691ae285f3e44599f1d3e2059921147a8b726df19ca2520b7921dd05686ee6b5713e34a0149d03c974aab26574ccba4eb866cd9907419186086dc9ce32