Analysis
-
max time kernel
61s -
max time network
62s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15-01-2025 18:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/drawings/d/1lcF19hyDnlhQFCdZbcgi0BPmy6PskBqCrGZPHf9mkJY/preview?pli=18057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631420392
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
https://docs.google.com/drawings/d/1lcF19hyDnlhQFCdZbcgi0BPmy6PskBqCrGZPHf9mkJY/preview?pli=18057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631420392
Resource
win11-20241007-en
General
-
Target
https://docs.google.com/drawings/d/1lcF19hyDnlhQFCdZbcgi0BPmy6PskBqCrGZPHf9mkJY/preview?pli=18057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631428057631420392
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250115181018.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\3dd336bf-d655-4f63-95e0-9faf50cae87d.tmp setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 2532 msedge.exe 2532 msedge.exe 3604 identity_helper.exe 3604 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1756 2532 msedge.exe 81 PID 2532 wrote to memory of 1756 2532 msedge.exe 81 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 4080 2532 msedge.exe 82 PID 2532 wrote to memory of 1532 2532 msedge.exe 83 PID 2532 wrote to memory of 1532 2532 msedge.exe 83 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84 PID 2532 wrote to memory of 1020 2532 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://docs.google.com/drawings/d/1lcF19hyDnlhQFCdZbcgi0BPmy6PskBqCrGZPHf9mkJY/preview?pli=180576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314280576314203921⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffb5b2e46f8,0x7ffb5b2e4708,0x7ffb5b2e47182⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff61d445460,0x7ff61d445470,0x7ff61d4454803⤵PID:2160
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6724 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9871596894120046353,11681884229219155710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59d9e89a46ea1c979d600d8ecff95392f
SHA1a03b20076c4a9bd34d03af90e43d5815943d187b
SHA2567d5e0d521951eff280f780f5134b8f1b4c614bb4e96ce15577201272a1e4478c
SHA5127bd673c3e908e62928b35bb2ca183a79e575775a1b76b1bd3e584c9da331d4a4c213b3de25fe209090504ce0af3f3823a27767196ed81cceb7f881106e068429
-
Filesize
152B
MD55e66a3d46ce02326d71914c69bb1ff5e
SHA191ccf10b11a8c2d127fe825840b0f5a3c5a51513
SHA2568408d688778cfc5151fd454f1182175674719a8a5709dd36aaac95512c7b1054
SHA5123fc4c3299a000fd48b25ec9fa88d87892fe60b3e82005195d0afc80e028ff270e1429bb2a4fc07cfcfd5d8c23a44283c92a11f9ff11d28ec951331e3df05326c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5374ebd93bdae0794a34623a5ced45523
SHA17c3862f65df70db96a16b815771d338496b4c901
SHA256bed4a2afb67811620211e7a4882f0ca22512d34d81f48389eb83599bac665f2f
SHA512108f9b809a2f448bb105ba9928c9e1e2b16828cc1eaa956517acc492da7e6e85428cfee9cfd8fb8546aef7e27338bd8c948780c2a549d09c9aea982c21794f46
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD515e648bbabb8fe40ef63a599af0c898f
SHA19c1ea81690126d38580a11a3159983265030552a
SHA2564e7c95e7ded405c246204f688b879bd06fbfa08e55ebbe0eb9189d7ea9900d80
SHA51240a014ec00fc3baeaed36e0d8677e77959af6ba3794fc015b78e6d3c5dd930e0fd89d632ce9a29aa99889816e6cec87a140010468ad5946d595c5e83a3102ffd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD563941d5453d20cc5366524260d8399d5
SHA1ead5d4c3645f8bfbd04cab36833c06ab2f066115
SHA256fcd3224a6ab080df2adc7de25834e990a1fc4f5d734cfcfe9e60c6ead087cd08
SHA5124f74ff2e4655413aa7a291b2433328e973f8e56efc3a799dcf87997220249b4816fa912fd0895312dabe07e7669e197297db2b4676005a5fbd15b9551c71bed9
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD527fefc8b4fdd53100b7664d389996374
SHA1e3bc7d3707efacd6b6e5af59bc22ec59ac0670ab
SHA25605fb92f714bae65fda09c8a2768937077105042dcddc56dd798832091610fc13
SHA51220a3d8865cc63f74fb47021242a3bbd3d985477f9174806ca6bfcdc9546aac24396f3988f64d1ccf9e7e1e90f24949350e3d6cd86138e0619a716f55035f5af3
-
Filesize
5KB
MD5bb5e9cc980bbef34c326408e9b33fc01
SHA1fea6203a042e046a8844b5a737f3e40b86a7dc67
SHA256ec09ab3989e1c94636baf3f8e70f9d680677ce2b4c756b78dc0c0cc6bf630e0c
SHA512f302db86b0947192e6deed63206deb7637182f9e9e07e15fba4bd5d96b4aa03e87868fd2a673a371e509466b6439a9f9bec0fca94e2871e672c977470f485aef
-
Filesize
5KB
MD576fcdfa84575a316c930d43546ef1e0f
SHA15525d22bd7951847452102c320e5854488db09dd
SHA256fe07cca5115054ea65d601f641397b2b0ea9140ccb1407ad2e2de9ea54593594
SHA512194def3d98b32fa6a8e3ddb539243b4f271d8ec09c5342e658d45123929957800188fe141a13ded6bbd1f634b8e486c7130042d58cf68e695d77b0c9f9f49965
-
Filesize
6KB
MD5b06b213618a26648ddaf7e6679acd558
SHA1122ceebe85ae9fd28222a67b3f64f67e88c9bd35
SHA2567347bf8307a783820d95d75a40cb32a35191b77ac3b0860ce1458b7de6fa1d39
SHA512d41fbd0d54e189d2510293724cbdcb607f3bd64d78a6ddc06cc6a4310b5c7d23b224c6c355fe3dffd8f892ad4e459ae58cd460cc858c6ac681e7c7d5c3d74e84
-
Filesize
24KB
MD5ff5dd20177add5f2fb07a017c096ccce
SHA17afe60457ca44419c3421847c4202a50fd4b80a8
SHA2560e18c1f1f59aefdb789413aefaeaa005421e9369195f7c35929008ec30b50cb0
SHA5123bbbb7e4af49e8a92b5dba457567a249db23b50a1b4a79c33bc38a14e5dc4ae9dbf480b6f42abfd3da28af57c06aeaf4b0b7f3da39b712ca49981c8c7973c77a
-
Filesize
24KB
MD58bbb70b63ea38955801783c83b928cf0
SHA191e76aa432aa9b323f7f8efb7dc94fe0b9587496
SHA256e31be9b1110c9d3f71b40293c8f3d21fbdb1d53910d91dad2ed1f29c363102cb
SHA5121172db8453c8902fe6ab8e417ae44da691b72e8e05a50c85d5bda1ae3cd6b54407b1393d9707cd152bc37ad56b1c380ef23dae445f8f27e35844f6233132804c
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
705B
MD5855ed621c54ad0b7395f8f1b7e0fb4a2
SHA1a0f0db46b0927aa87ead931e842a9aa5b0bf8415
SHA2566cb998c1a7142eaca150b4d46aa615e0afe31c3ee8fb1437aa42c7260ccff099
SHA5129b3e8f5c7698010aaf86841d2012442c668fa3f034bf6976228512066115df36395a32f5840dfd35244cba24f15e9898ce6a883dc526636d55b3684842c78cb0
-
Filesize
203B
MD5d9a03ca8c791ab89af1584011e177514
SHA1714bc1c0add2ada7bb993ede17d87553560dc4d7
SHA256fa0db0b55ccc3efec7da17d62d4d66b3837cb8e43f0893e0c936d5786b739334
SHA512f6195bdd860c93f81dba6ad6d46acca26cc24571df997d3de561a0bcc69d92a26da8bed7d6b1d8a7144b81b6db13abc38885a2eee0fe4d846f960cafcfedf64a
-
Filesize
203B
MD5969cc03e6f58b8ac81943fd96fa6bff3
SHA103fa463ee14a5c519188f0152f4cab230da9117a
SHA256381439e35f44707e017e7209555e4cb3efe0ba5dc3437bf275e988201051ec62
SHA512d4d70a9059e76dc4492092dd7ec0be7e3d21d1b632d7a786288eaae6302891491b796c6c40521e8b8a2e7a7ef2952a252ea4f6c8a5940e2982a34b5224fbb047
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5e1d9f4608c7f749f55131ae4870add3d
SHA1add0c5b783a3923a5a3d3dfc8798282a8b800ef3
SHA256e96be09c2b4f86fbadbc11f4dea3d2051985a1281e7d9c66a7f6baa5efdd4349
SHA5127374847bc4391415617a2daf76d599eba1504b2684eb90af9e1f450bab45a5187728cecac44c74cbeec19dfc6c5db667108f9aa3f55ee23d62edacae320d6e5f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5f9f43511d401d7ad84c321c461158e3c
SHA1011cc9f1793f857c2940e6157f4537be80ee7ffb
SHA256326d3e25e03a8e319b6336512008444b157bc4287b7796a05c408ad66dd806cf
SHA512c78d13fa645da8e402e6841bd45e4b57ea887fe6087294a3796521fa4c8dcf2def35b88557d33849185d568a66558dd8539da32b6ef6a347050169ef4a37f5d3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD51ac22839803c6087afa19f19b399ec5c
SHA18b1e398e1bf7edcbaefe8bab5b43d6c53e21b544
SHA256a06ddb1e21c2e5f32efabb810c49398b5d3c8a87d2ae3c75d4241ec855a7a7b7
SHA512fa7cae202ff5969e5a3541fbbf38074f624bcfe78c3637f0731b20665b62b1873537147840dfbf5c003436af4779b00ea8e94db79f92e99b423ae313fa0691b0