Resubmissions
19-01-2025 17:23
250119-vymwhaxphz 719-01-2025 17:21
250119-vw3tyaxpcy 719-01-2025 17:08
250119-vntlasxldz 319-01-2025 17:02
250119-vkbw3sxkcv 1019-01-2025 17:00
250119-vjgqyaxkat 3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 17:21
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 740 msedge.exe 740 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe 6120 msedge.exe 5636 msedge.exe 5860 msedge.exe 5516 msedge.exe 5516 msedge.exe 5516 msedge.exe 5516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2460 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2460 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 1784 740 msedge.exe 83 PID 740 wrote to memory of 1784 740 msedge.exe 83 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 2464 740 msedge.exe 84 PID 740 wrote to memory of 4340 740 msedge.exe 85 PID 740 wrote to memory of 4340 740 msedge.exe 85 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86 PID 740 wrote to memory of 216 740 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://firstmail.ltd/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa68646f8,0x7ffaa6864708,0x7ffaa68647182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6592 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6852 /prefetch:12⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6660 /prefetch:12⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=6356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4252 /prefetch:82⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7132 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,15786545454684936605,2525831163042594130,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1868 /prefetch:82⤵PID:4424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x470 0x3981⤵
- Suspicious use of AdjustPrivilegeToken
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
184KB
MD56136f7ac050eef7147be194ac288a78b
SHA1a8b8c5f040face49dd64f6e2c5d54982f5aef49a
SHA2566b75aef2262f015efb473550e5654dadc826122230f476fc80c69d7fd0d764ac
SHA512cd6008db224506e200df9a31a2ee421ddc57a6a331c95432d561b340df68319fa95240a71d93d1c74e1300faaa0d078742593ad7e2f3a35e226b9dd833fe9cc5
-
Filesize
41KB
MD53bc2b6052ff1b9feff010ae9d919c002
SHA1dd7da7b896641e71dca655640357522f8112c078
SHA256483a3494759a05772019e091d3d8e5dc429d098c30007d430639926c3ffa16e5
SHA5120b1632b73fd87e8e634922b730f83b7950e9a39697a46a3429f0bebb3f1ebd14c815a4651ee8f663a437d00ecbeb6ddaa47b2fcad719777edf1b1de8a7cad0f1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5b58e56f449d446f2e26666fe0600e205
SHA1efab6e2f92a2efd07392d21755a6b3154714c7c0
SHA2564d0794c41b32a915ef030fb6140473d65d025d2e6164559b48e37d0686a1989f
SHA512da52642e838eed7be75d51201c7cdb79285afcf677bdc14595df9c28435709637f213a3f3ed078d86a089e43283f0bc542b2eb41e568c31ad03b8e70a0d9aad3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD583818862ba9d76a1ceaca6551cea8152
SHA1de4df1976196969e138177b119ffd9b0d073efc1
SHA25636e2edc9b827faca569fff0aeef4b0960bdaa7803f309f132e0b902f74d6b140
SHA51244719d46982caa89db5a309cdb52684f0928281f25a47afa19d2a56f2824fca114d11a150d9ed7356d8481ed4e35fbd07f172906db9232c01302fd59b25d870b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD5d66761722c0b4f9e347f72d612014cd0
SHA1faefd1f9f71b0dfe79d35c7bf0b9e86d622ed688
SHA2565cb1feaaa08e4ceef39152c3c163ad93124b55b3e87aae96a141c67ebad25a46
SHA512926216ec96b53e132e1565fbd5cf103ba7f4d84a436743b3aceb507cf1dbc6b73163ff194eb3f86007f969cf9ad2fd5a8317b71aacd902a96d9b9cf1719787ff
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
8KB
MD59a96303b78e7c80d6bc668b2494c6f12
SHA133be9ffa900d156d2ca76331ecb0087d17b37ad5
SHA256ff930a0346e8ed003a337486bd44650c8af2ea05f910051cd1357381e8b94936
SHA512e2cb8c2193c61e64dbab29016f5d8be1090cef8fddfe2989e53e3f0664af1411281bf83fa387123396d9bccc18b8c34b3d5e17d3690eb85d5b25c545c61fc148
-
Filesize
8KB
MD5e9793605391912b98b30446af6651c30
SHA1ca08deca5b053ecb02d2ddf8df3b6c883233a053
SHA25625439e34c1022895a78c6c13ca26552ccb14bb3396c77aec23b73496cb9afca4
SHA51292f952857523c97a84772ee24a888a57b6088ad9f6f7099906333a5d5ff6b80a31db63b00dcb092247837b1e45ca5117ebf6e04ec66e7a64a40473f3a197549b
-
Filesize
7KB
MD59db5c812753340ddf56af551c7fd24ae
SHA190f7251504a563f3caea1d8e0b310651082158a6
SHA256205102f392e71348ee53fd9e1d15963b7fcae2a4d163c7a76c68e23c2dd6192d
SHA51200f5b14b34c61afc147c8367a14c112579045c40fd13b55c1e3dd96f49f60a348d163adc4f31f7128fb7b4e8fe7f82aa9e092aeca53045f64745c4424b20719f
-
Filesize
8KB
MD510f31ff79aa919f4968a12ddd23dc032
SHA1857d9332af093cc869b08c755d73e679140d43b1
SHA256da7ab07dd912bf9b8d874a0ee257b02739c65f144aa7c15a95e7631c379421eb
SHA512d34cc119ce6ff2a7cfb2bcf189fb4ddc9719dcbafde2626ee89641b906ee4578acb09a604c9ff96405a1089f7b9200307e448afe50efd0d6376125e647eb3bce
-
Filesize
5KB
MD5abe87fca4dc58ab31cbb691f9c52ce9d
SHA19aec13cdb0fb3eeb575b1bd7deae400d3a51423a
SHA2561ddddc27182ad500ce4fe15c5419d95c955bc16d3731d3097264cd29c97940f7
SHA51294c4f8e759474972dd8e8f37f5880c14016d2d4395c5943044fc46c88151dbcc50c5531eb51d67369c48944e0b30bc6ea39c09bc37ffb55495836c48073fe048
-
Filesize
8KB
MD525a9691d522823115594e203584b851a
SHA182d17b8205e76a3308be5e88f7698a2f23bf3a0c
SHA25680815fe778629859e5286e99410641ec2cb3a2287c6f91bbd2bbbe7da34c34a1
SHA512a6b81af03833a2e7be671201504d18dfcc4e7fb1908318400999862edbd7604c29cdf5a100b78e5c76d4a6526a37f7d21c23a065858c71ef169c426f120e2406
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5cfce87d65ecae2ced4890b10e2c1b1a1
SHA177023b5e1d45c2dc62505e143fb2ae45b01f8623
SHA2562ac19b6de9b271afa58a7f1342b41340e96da1e86f776cc97232ffd8a88dd560
SHA512b09aaeb3b2b4507a912f10007c02df5ffab804fe75b0c1dbe182b42629d3929b2b99e368f2f7bb092cf27a8f1b71bc6860c2b907b2867fd18987726f1d59789b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5833ad.TMP
Filesize48B
MD5ae44e5ef896ddad5e0984ebb4b5a1771
SHA1235ea425e9c09d1a7130eab387990bb2049e3e0f
SHA25631a666be0f7b8e2a0b37281f8fae3478af08569c25135ed04e60acbec1499d28
SHA5120f60cc2a5a1f3852a12252e3479240b0ea8657cb4a313f8cad954ec26dbda9f3c29f3da3bf89668c2fa6962b05165a311d18e06002c1068e74b7aaccb201523a
-
Filesize
1KB
MD566f5181513c453f2dc2051ff66616118
SHA1fd848be32ff6ebc46aad705afcad9a68c9929156
SHA256a1a934aa7f93682e1cacade5666ef4fa5a2f24709a5424bebd2df73f3caa3908
SHA512f1518e269c76afabfe6b17274c0a8e70065e0e7423f4310849bbb21185bad27ad71b72f29cf1d39073aa88d25b4ae202896bc8b9292e50b2c71f0faa3452eeb5
-
Filesize
1KB
MD5f0b37b60a3f946533e2ce7fbaddfec10
SHA1e45ecd71efecdc243b7f76e098a9351325cbe6b5
SHA2562c9f35d8edcc43a070d016d6509403119c9a58e2992a4ed1a9e74ef107471258
SHA5124e2b9289ee77ea770e062f57afa27e5136a60f6cd93596b5bc770ad25ca3cb39d93ca07ac2b1540c1780ceb099101a7baf5d4ca15ef9e0ee7b4bee7e5a824f29
-
Filesize
1KB
MD5704f00b145e46483b505924f6ba040f0
SHA190c0606262f206ccc8177b9b2d18abbead9a4302
SHA25682bc09cf4e90a6cd54dbc8bfc52aed1063cc8f6b9b1e0035ef7594ac14c1fb2f
SHA512d4134cc849e36cd5bc696e9ece1a615d7fc86c1e221b270afafe993d0822ec5bf0f495c2356283e0a758dad488c9c50e2fe52273f0b5aa963a3781d8271c9f43
-
Filesize
1KB
MD554861f0c5c1d60facf92de3284d8cebc
SHA1dfc3fe61355278d01670d1a7e1dfdba5775e31c2
SHA25640bdf125b172d0c0eed52b743a7489e444a519cab6c24975736c4062f914f80d
SHA512089c60483bee74486a601e864fc940ea783beae39f3d8e1b822e9163fbe3636d4570e3e83285942f39a12e779ab1a16a0e7e3c4319c9132dea75e3d0131bae42
-
Filesize
1KB
MD5d400bdc4ea29cf53ce86944a9bf38adc
SHA1b7560977c3f8af8d76dd4d1b7710aa4448daf27b
SHA2560933eb571bb7abd2b298667632cd65baf83ed7827dd84e5eb3258edb6b99c715
SHA51209f836e4f3c7d4ebcbbbcf9c1a5e8ab3fa4d53040e727ca6109e4d8aa1d2855c282daae965d86c227e5f643142d2c241449b1d625a6a1b5b484b0b92d6dc99d4
-
Filesize
1KB
MD5c5ed8f7e82fa0de186f0a987ba4fe2e4
SHA1191b1e676a68dfd4e761fdae36bd82c7e825040a
SHA256c4e962f895245f6e7f0e5b6c81b9347eb391e2dfe4a881f04ce78e99b915995d
SHA512a377c3c987fd2057e18e1b0e46242462a74d469180fd236c7f6e71527e7f80ba88f5d9cc4cf956bed0a72f2ff23e0029976a859812871683e8d46c1fd8120102
-
Filesize
1KB
MD5cc04fddf8eff9400bbd904b3408b0f91
SHA1033fdef8dc0632f43346330e634aa95f4b98c4a6
SHA256c951bee1e581f8bac0d82dd2b674ad5df329470b3067070d7ab6548a7ebda5fb
SHA512bdeed2969d2e35015a1e0bed1f7a514af69ff5ccb2f2491d513cb1923118eec30c92c10ffc4f995d573af63ee5025aeed78610c6bbd5765d95d4f1ccef08ce62
-
Filesize
1KB
MD54ebaea3597031a12229b55a283afd879
SHA11991f6247e99e6cfdc6c80b6fef3c92deb34b3d2
SHA25639df3587a3dc0a91f80a9af4b9d6f436651b74903bea45848bd3f0c774111fef
SHA51284c37a56db35b2d7aabbcdccbc8dee67a6c217d9c0b1429bf388b380f5feacc7e99ea10621c46e1c4b29f99d948e68be29a00e4a78cc1ca191ecf08d99aefa9e
-
Filesize
1KB
MD5e84bc27fd284c833e3fbaa8dc2072e18
SHA148f6f06f1222cca258f2e80c09ff587318f838e2
SHA2563e245cf3193a7e9cf94ad2211f3ea95014b04490be07a32350292d89c0bb7496
SHA5129b5495eab2a990df17ae99a516c0dbdcc9f56022e57a89a6d5d50e4cd912b2001b06c041e49e8f4f3671f78b1352e0147a4f39fbf964290eb9c8d874fdfb2235
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
10KB
MD5e21d15719b87d05294995108e6886f11
SHA14b6cba6915cf0760af93b3f1af2ae2df63e08db2
SHA256df891263708dadd8fd03e29d1d2b10dda3afabd80961ecf2c6c9b6ba2d1a5f5a
SHA5129c89081a8a92cf4ad686eeb96fd7dec2b0224640a7f4500abb3ee20221fefec63b398d4d6594b96997b3304d7189c912aaae9693871381dc30c28ad36e7862b6
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84