Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 11:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://clicktime.symantec.com/15w29hs3fuDo8ZJUYSgYz?h=XwRf4JYAd7rzvn01EkBYgElYenLkk1pbex5AF2SaiKA=&u=https://protect.checkpoint.com/v2/r02/___https://url.emailprotection.link/?gPsPCuxtNU0ZIfN-BcDDhTADSslPrKJXTyBH9KmMsErnCMybXz7O%2A~%2A87_WNS0w2uKXBDh9AloZFKpLC6q9F3mloIijLSRpEVn7ZAan-33J_264W/UOgJNzH3nK-2Jpb-ccWW2GY%2A~%2AlIfw%2A~%2A9hKkmIP7qA1Tw-PKrFEO/UOspnt5Qpmk%2A~%2AOqXz18wogu59zLLO8iLKrKLZQNFPrLTQY6%2A~%2A0NL%2A~%2AaZNBBsMt2_87SBRig%2A~%2Ao%2A~%2AvT4OZs9xr77xmCr2o%2A~2%2AKO%2A~%2AUE_1g/pXm-R_uiMMEfY/fn-DFOto%2A~%2Ak/gFMiaF1Qyz34IyS2fygQNH1F3q/bMg9abIjzfcSCKak_bpb-v2jsHhUhB-GVuQO6hvUOsFEjuyQBNkBEj5gM_ZMGXsJ3xhrBf9fzqcim3uLOO7tSBo1MtHX/WFt60bq0mWAK3zxkyKI9hS30VvAy7U1ZGkgIa22cb4YqakGPm5lA/kRyTXs-UzG1QYnxU7vHc61JhU0XayJ-E-HbBBDynrgu4xE941GsN/RoG_wFNHqJaYFvsLDzMD%2A~%2AgPb9q9MkLbQcOi/mRTQi6YF9LKsLbaBRTIh53VIKEb/gr23LDAoPzj0MKHlz3igYL6QjmMMMuNpGAnEXMF8HNzQLYhBTjugMhNaOOSOTlop/YokUoHo8knMxfSSwVN94iUcxuBhwmAZ7WvNHPTi96EFZ5rgkvp5V1gcrvQCxYca2fImM/7/YFI_HVD-v6JoUz%2A~%2AUz5UAjaIv8us4nAnj534Ka/z/F4MxoUrY-Vxk%2A~%2AhHp339EiQz77xZAfXtGh/pmWIywUx/6LnbyRh58L8Vo0PfyusX%2A~%2AtihxiZK2zZ1b6T7zNWl8SA0LXj_Q8syb4WPvu615cWKU7Hl-F67ArubIO-8%2A~%2AMMpVWHqWwqc60%2A~%2AuHRKK%2A~%2A8MVCq0N8aMADU5SRhK18Y8yZcYbxpjg%2A~%2AS-%2A~%2AKFkxAk_tKA8ysaas2KqAOrViJSHC9I3kOoAOXtPAg3FksSHEAh_tl~~___.YzJlOm1zbm90aWZ5OmM6bzo1MDVlNDFmYWEyMmYwZjdlY2FiNzBmYmJjODQyYmIyYzo3OmZmZDc6MzhjM2Y2MDhiNTFhMDI5MTY1YjRhZjk5ZDJjMmQ2OGI1NWM5Y2M0MGRiODkwODg3ZjVjYTlmYWUyODNmYjAwMzpoOlQ6VA
Resource
win10v2004-20241007-en
General
-
Target
https://clicktime.symantec.com/15w29hs3fuDo8ZJUYSgYz?h=XwRf4JYAd7rzvn01EkBYgElYenLkk1pbex5AF2SaiKA=&u=https://protect.checkpoint.com/v2/r02/___https://url.emailprotection.link/?gPsPCuxtNU0ZIfN-BcDDhTADSslPrKJXTyBH9KmMsErnCMybXz7O%2A~%2A87_WNS0w2uKXBDh9AloZFKpLC6q9F3mloIijLSRpEVn7ZAan-33J_264W/UOgJNzH3nK-2Jpb-ccWW2GY%2A~%2AlIfw%2A~%2A9hKkmIP7qA1Tw-PKrFEO/UOspnt5Qpmk%2A~%2AOqXz18wogu59zLLO8iLKrKLZQNFPrLTQY6%2A~%2A0NL%2A~%2AaZNBBsMt2_87SBRig%2A~%2Ao%2A~%2AvT4OZs9xr77xmCr2o%2A~2%2AKO%2A~%2AUE_1g/pXm-R_uiMMEfY/fn-DFOto%2A~%2Ak/gFMiaF1Qyz34IyS2fygQNH1F3q/bMg9abIjzfcSCKak_bpb-v2jsHhUhB-GVuQO6hvUOsFEjuyQBNkBEj5gM_ZMGXsJ3xhrBf9fzqcim3uLOO7tSBo1MtHX/WFt60bq0mWAK3zxkyKI9hS30VvAy7U1ZGkgIa22cb4YqakGPm5lA/kRyTXs-UzG1QYnxU7vHc61JhU0XayJ-E-HbBBDynrgu4xE941GsN/RoG_wFNHqJaYFvsLDzMD%2A~%2AgPb9q9MkLbQcOi/mRTQi6YF9LKsLbaBRTIh53VIKEb/gr23LDAoPzj0MKHlz3igYL6QjmMMMuNpGAnEXMF8HNzQLYhBTjugMhNaOOSOTlop/YokUoHo8knMxfSSwVN94iUcxuBhwmAZ7WvNHPTi96EFZ5rgkvp5V1gcrvQCxYca2fImM/7/YFI_HVD-v6JoUz%2A~%2AUz5UAjaIv8us4nAnj534Ka/z/F4MxoUrY-Vxk%2A~%2AhHp339EiQz77xZAfXtGh/pmWIywUx/6LnbyRh58L8Vo0PfyusX%2A~%2AtihxiZK2zZ1b6T7zNWl8SA0LXj_Q8syb4WPvu615cWKU7Hl-F67ArubIO-8%2A~%2AMMpVWHqWwqc60%2A~%2AuHRKK%2A~%2A8MVCq0N8aMADU5SRhK18Y8yZcYbxpjg%2A~%2AS-%2A~%2AKFkxAk_tKA8ysaas2KqAOrViJSHC9I3kOoAOXtPAg3FksSHEAh_tl~~___.YzJlOm1zbm90aWZ5OmM6bzo1MDVlNDFmYWEyMmYwZjdlY2FiNzBmYmJjODQyYmIyYzo3OmZmZDc6MzhjM2Y2MDhiNTFhMDI5MTY1YjRhZjk5ZDJjMmQ2OGI1NWM5Y2M0MGRiODkwODg3ZjVjYTlmYWUyODNmYjAwMzpoOlQ6VA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1108 msedge.exe 1108 msedge.exe 3528 msedge.exe 3528 msedge.exe 4440 identity_helper.exe 4440 identity_helper.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3004 3528 msedge.exe 83 PID 3528 wrote to memory of 3004 3528 msedge.exe 83 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 3784 3528 msedge.exe 84 PID 3528 wrote to memory of 1108 3528 msedge.exe 85 PID 3528 wrote to memory of 1108 3528 msedge.exe 85 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86 PID 3528 wrote to memory of 3760 3528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://clicktime.symantec.com/15w29hs3fuDo8ZJUYSgYz?h=XwRf4JYAd7rzvn01EkBYgElYenLkk1pbex5AF2SaiKA=&u=https://protect.checkpoint.com/v2/r02/___https://url.emailprotection.link/?gPsPCuxtNU0ZIfN-BcDDhTADSslPrKJXTyBH9KmMsErnCMybXz7O%2A~%2A87_WNS0w2uKXBDh9AloZFKpLC6q9F3mloIijLSRpEVn7ZAan-33J_264W/UOgJNzH3nK-2Jpb-ccWW2GY%2A~%2AlIfw%2A~%2A9hKkmIP7qA1Tw-PKrFEO/UOspnt5Qpmk%2A~%2AOqXz18wogu59zLLO8iLKrKLZQNFPrLTQY6%2A~%2A0NL%2A~%2AaZNBBsMt2_87SBRig%2A~%2Ao%2A~%2AvT4OZs9xr77xmCr2o%2A~2%2AKO%2A~%2AUE_1g/pXm-R_uiMMEfY/fn-DFOto%2A~%2Ak/gFMiaF1Qyz34IyS2fygQNH1F3q/bMg9abIjzfcSCKak_bpb-v2jsHhUhB-GVuQO6hvUOsFEjuyQBNkBEj5gM_ZMGXsJ3xhrBf9fzqcim3uLOO7tSBo1MtHX/WFt60bq0mWAK3zxkyKI9hS30VvAy7U1ZGkgIa22cb4YqakGPm5lA/kRyTXs-UzG1QYnxU7vHc61JhU0XayJ-E-HbBBDynrgu4xE941GsN/RoG_wFNHqJaYFvsLDzMD%2A~%2AgPb9q9MkLbQcOi/mRTQi6YF9LKsLbaBRTIh53VIKEb/gr23LDAoPzj0MKHlz3igYL6QjmMMMuNpGAnEXMF8HNzQLYhBTjugMhNaOOSOTlop/YokUoHo8knMxfSSwVN94iUcxuBhwmAZ7WvNHPTi96EFZ5rgkvp5V1gcrvQCxYca2fImM/7/YFI_HVD-v6JoUz%2A~%2AUz5UAjaIv8us4nAnj534Ka/z/F4MxoUrY-Vxk%2A~%2AhHp339EiQz77xZAfXtGh/pmWIywUx/6LnbyRh58L8Vo0PfyusX%2A~%2AtihxiZK2zZ1b6T7zNWl8SA0LXj_Q8syb4WPvu615cWKU7Hl-F67ArubIO-8%2A~%2AMMpVWHqWwqc60%2A~%2AuHRKK%2A~%2A8MVCq0N8aMADU5SRhK18Y8yZcYbxpjg%2A~%2AS-%2A~%2AKFkxAk_tKA8ysaas2KqAOrViJSHC9I3kOoAOXtPAg3FksSHEAh_tl~~___.YzJlOm1zbm90aWZ5OmM6bzo1MDVlNDFmYWEyMmYwZjdlY2FiNzBmYmJjODQyYmIyYzo3OmZmZDc6MzhjM2Y2MDhiNTFhMDI5MTY1YjRhZjk5ZDJjMmQ2OGI1NWM5Y2M0MGRiODkwODg3ZjVjYTlmYWUyODNmYjAwMzpoOlQ6VA1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1fe846f8,0x7ffe1fe84708,0x7ffe1fe847182⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6404 /prefetch:82⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,1754958473037443747,18212392567829825815,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD50a21233004134950a49a5d7e7ce604fb
SHA1974c6a3e649298823169eb6e8d1087969ebe17da
SHA256d203bc5950caf185df3d26e286944c1638924a9d225bf31c29fa717ead74db7c
SHA51212b417891ef6f45e1847e26f668f42cdc7560bd45a917a48ff850bebe1a861e669271492d4b591ed9425659c94f7b0e725d6c78bf4111f424aa92e092fff3a83
-
Filesize
1KB
MD5fa1480596f2363af388762951b3642de
SHA11621494c6af057e8966597aca46fdebcc0421b00
SHA256762a9af4c6ec62a6d79a5c1c1ad8f6673845408626523907ac55c9e174f5b1ae
SHA51278b310a32e36398c2ca2da9dc529af7b5ac9bb713f392960b5cbf65bf61628dd09e38df1f57c3d70a2558b37ca393d429d0a1f200817d1439ed5b54be25450be
-
Filesize
5KB
MD557109cc4209924aa39ca330a78f9107f
SHA1ebe28c2bbaefeb3255f797b25a300b15cdb941a0
SHA256f8bc961aa3dc0e3124724f45934dd876f847554fcf56e82a08844504c96e5a1f
SHA51215525140c37d071c627cd9cfd1ad43a9b6b16bc8b0e3ec9a5216a8c2fca2aa391de17e56637091482b08303d01978e7381a0d32fe577af15dd71cd67c332c15a
-
Filesize
7KB
MD57c51e9bfa4b3ab114edae29fbbf030c0
SHA13cb7fb5e52818917f7974703e2b644ba04f7e9c7
SHA2560b1ea46ab3c6c2c97285bfdea3043e51d919312fd75aab6e58e2a1671b78a273
SHA512d218a14b790b3afe91e4472c0d5a08cad56ee259c6727d67e105647e4a638cba3a472823367f6f6c3d8a18b6330337183b35b1acdc48efddc966b5573fa9bdf0
-
Filesize
1KB
MD5beebdf6cc98cbd9b6616ceccb87a5dc1
SHA12a25ab6a8bdaa7c0f065ff0f6e352c4e20c1fe36
SHA2561705aa8ad1efad3fdac2f840595dc51ad533ba184c6ef16107ec62a84876cf80
SHA5129cd5a336c975ae0d276eeb8e6bdd89ca3b235ece5a454836399f6483751306cde8207775e5f896512a1efc28b937a4739444f35c050be0174ae602812c4fe98c
-
Filesize
1KB
MD53ea745ae76014ac067c75a68886de48a
SHA16ece86d9ea63d14cf342b88370d4d0ff9123e02e
SHA2563acded56c9ae552dfa0451b36f4d6db6a7f43d6e422d837b31a1153f53f21cab
SHA51294f2cf8d95bac106c6ebea34bff798d2ac9a3284d15cc829a41f2356bb29aefee98a9b36a6e2676128097140c507e51e4f8ea5909cafe65902e64685ccfbaa39
-
Filesize
1KB
MD560e34554c8866ccf4254ecee4da70164
SHA19b22357dc7c2f7cf0b3bc6b52f5afcf9dcfff997
SHA256ec35e331945951a174fd1783947dc7eab9db7b41370d5b5866eb38341925c721
SHA512f72322ee943549a41d70f13a1cdea18371eece3f2699c645b9846fbbb30dcbfcd3487e8fcadc7da7070d7f657fb509e84a9674bb8ff0f714009302b22db6e529
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbc929580744ba445b7464c4e9dacf26
SHA196564722e35b9ed1abbef0d8e5669a23fb0a8df9
SHA2562f42af96529c4bef4457b6cd1a5bd3bc312346f7c1d16901ec226325b0188282
SHA51258d6b6d7cfc85a4080be5bacbb17710ed0994b9bfc60d7bccf1f4d26ec77ce3dbd78d8bc80e8cd0ef34f04fb8a5ed4b555271ba06a359af46aed17bc346fed81