Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-01-2025 02:57
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2760 msedge.exe 2760 msedge.exe 5704 identity_helper.exe 5704 identity_helper.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3532 2760 msedge.exe 77 PID 2760 wrote to memory of 3532 2760 msedge.exe 77 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 4460 2760 msedge.exe 78 PID 2760 wrote to memory of 2860 2760 msedge.exe 79 PID 2760 wrote to memory of 2860 2760 msedge.exe 79 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80 PID 2760 wrote to memory of 3928 2760 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://stemmcommunnity.com/1058429160251⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbbd233cb8,0x7ffbbd233cc8,0x7ffbbd233cd82⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1944 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6880 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6908 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7160 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5313403214843439373,11642774401305026494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:5968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
24KB
MD524c1ac9e5814fdba1876bd70e65b55d1
SHA1440f8a4de77e05a029ae06d4f500c72308285d6e
SHA2567cf9b84f3812c9377c20ff7b0826eda7092f11f33dd4af560413a6773f3fca43
SHA512bc848fd4ccce7a1705b2b14b2ba1a1503a6a306096ac8460480bc653a2d9d4744fe21a0a39db573d7363b3c1252c6db1b594f029c04beeee9ccb5714c80af7cf
-
Filesize
19KB
MD599af5da82ee74e7d9502225446604614
SHA17deff05853fbf1528875f9c358b8a6a31d6dee5e
SHA256031fe7ea42e0a823949190f13ab143f1d9d26fb0b22d863b582593a37cbcda9d
SHA5127d2cec0882df88edbb4789fc14c7721f6dca5681c85919ee1f033d5cb2324f9c1305707bbc4c534e0019a2b163291edf4bd65c374e843d75174589e7148aab07
-
Filesize
40KB
MD5a470afc683c0884e0eecbf5dc4145f75
SHA1fca0247e27d464bfef50a7bc751c06a41e65cbd4
SHA256510940a8bea63e45e47699ea55eac22bf4af4e8cba3b6f20a4948d21d8934553
SHA512d8ab0bd333c9f809ebb384d53d82c7451a03178cf443c15b903f110b7bd8631dea11cfc0b479028f11105b7de623ec48793d8925c3ce268244c644c71b5072b4
-
Filesize
121KB
MD52d64caa5ecbf5e42cbb766ca4d85e90e
SHA1147420abceb4a7fd7e486dddcfe68cda7ebb3a18
SHA256045b433f94502cfa873a39e72d616c73ec1b4c567b7ee0f847f442651683791f
SHA512c96556ec57dac504919e806c7df536c4f86892b8525739289b2f2dbbf475de883a4824069dbdd4bb1770dd484f321563a00892e6c79d48818a4b95406bf1af96
-
Filesize
119KB
MD557613e143ff3dae10f282e84a066de28
SHA188756cc8c6db645b5f20aa17b14feefb4411c25f
SHA25619b8db163bcc51732457efa40911b4a422f297ff3cd566467d87eab93cef0c14
SHA51294f045e71b9276944609ca69fc4b8704e4447f9b0fc2b80789cc012235895c50ef9ecb781a3ed901a0c989bed26caa37d4d4a9baffcce2cb19606dbb16a17176
-
Filesize
120KB
MD56168553bef8c73ba623d6fe16b25e3e9
SHA14a31273b6f37f1f39b855edd0b764ec1b7b051e0
SHA256d5692b785e18340807d75f1a969595bc8b1c408fb6fd63947775705e6d6baa66
SHA5120246cee85a88068ca348694d38e63d46c753b03afadf8be76eca18d21e3de77b495215ed2384d62658a391104f9e00df8605edb77339366df332c75691928efb
-
Filesize
119KB
MD5d45f521dba72b19a4096691a165b1990
SHA12a08728fbb9229acccbf907efdf4091f9b9a232f
SHA2566b7a3177485c193a2e80be6269b6b12880e695a8b4349f49fccf87f9205badcc
SHA5129262847972a50f0cf8fc4225c6e9a72dbf2c55ccbcc2a098b7f1a5bd9ea87502f3c495a0431373a3c20961439d2dae4af1b1da5b9fade670d7fcaed486831d8c
-
Filesize
115KB
MD5ce6bda6643b662a41b9fb570bdf72f83
SHA187bcf1d2820b476aaeaea91dc7f6dbedd73c1cb8
SHA2560adf4d5edbc82d28879fdfaaf7274ba05162ff8cbbda816d69ed52f1dae547f6
SHA5128023da9f9619d34d4e5f7c819a96356485f73fddcb8adb452f3ceefa8c969c16ca78a8c8d02d8e7a213eb9c5bbe5c50745ba7602e0ee2fe36d2742fb3e979c86
-
Filesize
17KB
MD578009b0bcd5f695070babef7964ce279
SHA1817fb69778754c2d5976909a48525ea46136992a
SHA256a179f5a994b7974aec4a54c2af8d07d1d0d9d2cfc66c81246e1299a5a0b1ad19
SHA512922be73fde8d54afead642c60b480f7c2d54fda6c840cb6976b02f10d12d67df749b5af21b7e441342c2007a17287b1ed55a9dc894638ff8fe21454be171b42d
-
Filesize
218KB
MD5e93e966d21aba85448fbad862ebbcbe3
SHA10bd6beb5ba0bee448204e60d3c40450b1bfa2f0e
SHA2569cf8953f31921ac3c2c115ba667b1f2c6c7fd9996dfc01a988b4f708435b4678
SHA5120c33f82e4e442d02505388f2824a4bba9fd509ab259104eb98ca7f482c2e92b88a15939826b3cbf833cb9c43d76cdbd4dcbf6dcced03499aa26f6f37855d45ec
-
Filesize
66KB
MD5100655c23b1e2cbdadf8919bf6f14f50
SHA11b535aa013148bcf8dbae70f31064ed03380f97b
SHA2569de4c1063286a2bcfe2c2b232e45bd8947e70d941f4685a50fd9d99cc6b74fe9
SHA5129904ae2ea00d092f4d2cad4969d26e08b1840373e6869b358f11686d109b09eebe25fbb6a45671a918e1be53130a4ca20cb5e217348a855811cc4fdc32808f67
-
Filesize
205KB
MD5c9c9e7a0321c20a8faea53cb744f62a5
SHA1a4f7964d6df916c63bc019879e15dfd8a010c9e8
SHA2569dc45a4308a94cc765a3fe2409e6998871eadf786e01bd0fdcbc5e354ced331d
SHA51212bfb41ca0dffe67448d2ca50e44432d60f150b588e168efcebe37ce4f030da3161936d443735587b9833eaf506d6448bce92985c16456caa6b2b94b48b7896e
-
Filesize
22KB
MD59d53309ac2415ed6efe77b43a5a2b2b6
SHA131d26e32f551242c037116da7fe1f039bd1c4b41
SHA25631e667f7d809056c4199b4204f46dbc6cd118a97530308229bbb9d450c42f89f
SHA51225510c4cd3ac3388a1c91b5011e12a34c409f272d8f7fbec1a89cbff45f2553f7061c1f63d1a2c06f8773b885bcabd9c96501434b8905778132fffef80989476
-
Filesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD53d3a68cad30a103648c9c593aaaffdae
SHA1318e705f97d6dd679b75f112afe16bfe7ac4c87e
SHA25622f6b16d161a1dcf4cb9e114335261a854f2de8de52c13940f1a60910ac4834a
SHA512564e21d1288ff9be213ceec61ab51535ac9513904492dde2ace1c33da73f509b9f72e8c621c42569be35400e27e424fd5f06634f29c4a662d3ef9d0e97e5a30e
-
Filesize
1KB
MD55a0d63d0363bcb4dbb666c806fc41888
SHA14ade5ac724a8667877207c29f112cda2373f9cab
SHA25624a9253b5b6e48565ff660dde0b6d301a8b622fb4b086cab9dfda3bae7b85f94
SHA5123d52e6feadf50bfd2b773a39690eaf6420d1fa4156cb132f9e0047377524a7c0bb05f130a484ddf5fc6dfda56949a23e105d1ab26fe1ca8c54f3b3dae9a8c0c4
-
Filesize
6KB
MD50907e84cbaa4f0263c52a8b1196c0463
SHA14ded08b0625f695e999ff2dc5e236194b6028547
SHA256c8500bd2a91d65b4f2925e07b8c5ef5a258a95bea6c510010ebf07e29c5d2934
SHA51254e8f5eeffd4378039d10c7f57784db0e8a58b6cfa7564ddfe9d3361914e5d7ba087aac6ecc27a86f768300bc372d0e23d33641a3af603364e9488d540b4b265
-
Filesize
6KB
MD5da43fe1031ccd130132094f1132f8b47
SHA1e2c15ccd7648abc0eb6400452607e3f5c2bd16d0
SHA2567770610c8149fc036cff7291ba25dc3f3d17bd52a53856a99023336af1b57a77
SHA512d6076151c4b46d515e08b61e5f2a62fc1f34341ed608afa3562e32eb295ab98fb70a288e82e2c88a66680c5658b3b073305efd3937505a2b24fe9ebd6e6623b8
-
Filesize
5KB
MD5ee26e1436b8c412340ce7ec0bdbc576b
SHA11ebcf04cd03c8b852684fe04a5db045f3c3d1294
SHA256f43d730b04ad6a0a1519ed1f1efbb382b3ce665effb10f76b129205347dfe25a
SHA51257e6b21a9fc0d2e8143884a0808a801a2b02a05ef041f39f89c37c9fb4a9abde121385279416e3440b53f1a704d7aa64e721c72bd4ac75a39e1526cab4744b86
-
Filesize
7KB
MD5bc3c2fd5b91089a56a400dc71e3bc670
SHA1533003f495eff367e9b1e6e3889f84e020ebb5ab
SHA256082eca81855d17b02f1e9e8e444bff8e38ce49dc286f0321984bfdd4b9726b25
SHA512868aa63b50357ced26c9f92bab34a9e3f34c2456d5caf45767aa7628a79db651d21faebcda47a556624aa04e0a4ffd6c9b8042acd51b717cae87ecc9d9c86506
-
Filesize
6KB
MD58da6f860282ee61d90ad2c2905110c6d
SHA1ef42d70a300f6defc6463185cb335ae7a34c4332
SHA256562241bacf599fc0f46f18eac53a9d5ce8c41f2597459e66b3fce992dbbf78e0
SHA512b80e662940bc7eb2491734b0ec13c8ae36a632a4e0fabf35bb91ab870cabc3a5d79ff992be2cc3ce18863d94781c09cac0a08ca05b2df2e0676e2410bcc2f147
-
Filesize
6KB
MD5831109ed96b722be44e4fa4e5b0d7899
SHA1b842dbfa5150fd729f00d638a73b4cba9d348a1c
SHA2568fe9fae4ffa05bd6ae7556ae231cfe067a2078f3bf937e7e710df49dfd9315d4
SHA51296b42227f0001ef6a3c436d7fa4c96239b199b63246b711aa384683db5ca43802e8c8aedabbfe004b962dee054c30d566f1a2bb66e4e801721857c37daf3b1e9
-
Filesize
7KB
MD595c9c81cef80caf8b7ca82ca7fb0c3f8
SHA1f70d5b48d35093db9f896520e32d748e257a8ecf
SHA2569186c976a04b6f67bae9fc063c07e42c59b1e631feb015abeb81bb5104ca6ade
SHA5122a73fb1dbac34599c7d41482ff56987d402c350dfb14c8b1370265134b7652d7468b81184df4922ba03543f257b5e4928931ba740a4daa47b3629ec8f36f5a69
-
Filesize
1KB
MD5dedfc372fa1ae0a62465032ccb85955a
SHA1df1ba851de3e8cf93bb4ff3d25b6a802fb302b98
SHA2568f28662f96c629b75e07cead50091d746b1de6d96c9afc7a2d541f844a12a7d5
SHA512f86bff3de0c1632be6752968aaaed0a3b6012720c3f337a18c19fb2efa66d0e3f62d49eb5c70d23ccce4f27d35a972a59f869738a47de4a7817f0f28f779f46d
-
Filesize
2KB
MD5d338ea96e0eaf68086967e81d423d1d5
SHA1e1fa67e02792d6e20442b5204445c02aebcc879c
SHA256b2e1c1a3d2ff8a54d3c2c6ff43355e43fc26fbcb392aefe0684d0f3d73ea709f
SHA512072b831e8b3957f57573def05cd3e09fea9b0874f6c38425ee539e0f6fd2484df8af0c2a25bf5d025e32bee1035d7ec6769bc960f473d1e424652372c7cc0c45
-
Filesize
1KB
MD565688dc41fc756061c78aa3119ffdfb5
SHA169027c78bfc1e77ee18ef44ca01eeb0696b4ac03
SHA25613830d56bf17bd9ea0e17f86f5bb7029cf95f09b3d4effba9b3ff30a5c7bc6d9
SHA5129841ae1bac798f39ec39ea60d186ced7f74862d3a3e7087f007be19e40dd4c4a138c4388dc52585db863c4f6ceb57e9b6155150f026712683c8b3d33a2bd6eeb
-
Filesize
1KB
MD51d363039feb23cb71683bad43eec0ad8
SHA16dc37e23fa3287e579f1c9b6ae17ad8493046bae
SHA256421de38dd1bbeb90573d51eee2b3eec9b051cd838fb411c3efe3ac0e0ec8a821
SHA5121bc4abd48e01709f6c51b5d7af93e299e7eb507384c81caedf2d85d34ac3fa80cd35290d79a2a51d8f4e557ee50b4e9c24f6b6891498f3d9ee1b41497f487f21
-
Filesize
1KB
MD5205d4e3d9bdd9e9436416c87763b93a1
SHA1d1e415f01e03e9a97572959c455040ceaafe03e4
SHA256409644c9b15118f7c9d3c314912040016748370dc5938627c50d3922363340b1
SHA5126c863a2be23d586e30521a9df24c84a958b79b749e7d8c349d45d3cf77a4395663c023876f531718426bbca1986878334e981fe5cc19001213c529ffedd02351
-
Filesize
1KB
MD5a9ab5a6c2aab821bdef706a8699ff802
SHA1c22b34fe3038fc2ff64a74b36d5341030cc6b701
SHA256067439235507939dcea3e17742245bcc1b6fc2d2d8b026efe4c15d6db6c95495
SHA512dcd61ea35d391ad6826a091108e1f4031fea8fd734bf9d540b05e0ea28c50d4da6ff5e584e09c6403a12e285fdf2656c41e036a54347b05db13a8cb052dd7580
-
Filesize
1KB
MD50c5ce696cde5c37b2120b2a2173c9422
SHA194b0e1f8552d6f4c0211452e5abe064d1886b0a8
SHA25646a50a960f855a7c67c70a907e4b6c9b756af18cfe82833699bbe5017acadd38
SHA51224bfe853b86025ceb43b4adc2294d9c394f6168a8ad66895e7791d77d1ce501d761f826205e67695c6f5a7f728d3c9d81c803a5856493f0cc2cedf7918771d06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD543605634597812bc38d40e4677231a14
SHA18606fa297c4a6885d43ab2d71b631bc181c8ddfc
SHA256dda036d5dcf779ffffedbb9feb9d7c6585786d79088dacbab6a7e8b998e431ff
SHA512ead13a6500cc44cd2bfdb9f1ee3f5b26613b426515ac809f1f56a5b819e1edca096712bc8ec2b4391dc33e2f952d0b6b328903c079c0aa4451208f4693931592
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD565adcfd3b743c2eb4d3c2bd1b6e0ee7f
SHA196d43d6b7036098f05bf88b37ca4febfbf1df4d0
SHA25697d04d25a93e3e8df65e69de6c9106c5953201899e3d201702774310d4036796
SHA51223d25e8f8276a279b4e1a0293a1970be77ce8963b884a5384ba2e9f89d9f9817771ef6993d7f829809aa48de37fa9730a4fedbde4218bb01b3edd4def23e8834