Analysis
-
max time kernel
1017s -
max time network
1046s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
image.jpg
Resource
win10v2004-20241007-en
General
-
Target
image.jpg
-
Size
1.7MB
-
MD5
934e32e00389536db6bb16a3bb266777
-
SHA1
8c37327a749298e1bf1b89b026518bd3f6348f7c
-
SHA256
d7b7d864396d9dc60f78394195a2a0f258c7d9e5cfe2b34b011ff72e94163c73
-
SHA512
3a1c0e6339652cbd60d1789ede866f2cc9dfbe3acf65207f3c421eeb7fd4eb540720600e81d420bbfcae3cb526fd3d6e9e3aeb6d7bedd9e86ca22ede8da6e915
-
SSDEEP
24576:BTHuHxx3HjftA0fBdVxOKPby8IXYgdTFoBGVe00v8TBwSRXpcVL8lix5cB9:AxDlxKPYgdTFwGV3lEVqifcB9
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 348 mspaint.exe 348 mspaint.exe 648 msedge.exe 648 msedge.exe 912 msedge.exe 912 msedge.exe 3516 identity_helper.exe 3516 identity_helper.exe 5300 msedge.exe 5300 msedge.exe 5300 msedge.exe 5300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 348 mspaint.exe 348 mspaint.exe 348 mspaint.exe 348 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 1188 912 msedge.exe 102 PID 912 wrote to memory of 1188 912 msedge.exe 102 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 1704 912 msedge.exe 103 PID 912 wrote to memory of 648 912 msedge.exe 104 PID 912 wrote to memory of 648 912 msedge.exe 104 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105 PID 912 wrote to memory of 956 912 msedge.exe 105
Processes
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\image.jpg"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa8a6646f8,0x7ffa8a664708,0x7ffa8a6647182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2324 /prefetch:82⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1872 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6701066173754753287,3248174184404136402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
Filesize
17KB
MD5cb154c913abd33077c8452da8057f0e5
SHA18ce1171fb48ee1d99df6131be2ffe8a6d7e86d7f
SHA256569efd927763fd38879e51bfc1592b0102efa5261f135af7e78a11dea40733e3
SHA512e11eee6e73ef98c336cfdbed1028ebc464c56a80abcda9fbdd783f2b1ac4060ba52a11f0dbd08b3168400f28f46238b8aeaf2773e1e6b1f844dd6167bac47328
-
Filesize
16KB
MD548c80c7c28b5b00a8b4ff94a22b72fe3
SHA1d57303c2ad2fd5cedc5cb20f264a6965a7819cee
SHA2566e9be773031b3234fb9c2d6cf3d9740db1208f4351beca325ec34f76fd38f356
SHA512c7381e462c72900fdbb82b5c365080efa009287273eb5109ef25c8d0a5df33dd07664fd1aed6eb0d132fa6a3cb6a3ff6b784bffeeca9a2313b1e6eb6e32ab658
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5df263995fdb1570e29693d3669ab79fe
SHA191ebb650b5fde1e0e5c6130850de617dbbc59037
SHA256bc16865e15a595043e60083b88adcfa01027061368b76ce392f1062e319273e4
SHA512dfabfa6685d077e935be7def8abf1d3383e1fa6d0152b8b2ed950f7a6a3939794b7e2cb6a8a732a9e34fcb7c13207ea6e8d48cd3b0b2ac20f6e44f280fa2eb7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5ac1753bb13bfee70ad0f762a7079a78c
SHA19d675ae0b7252b6cc684008ebc5e0daccdb8b675
SHA25627f4065279e11b233af32216009e9a56aa673a0dc4df21ede5d03bb3d8d7af56
SHA5125024fc39ee6fac6a674777fa5059a85d1af858d72e766e2e3794c183d3a487b6a73650aef46c9c7ffb591cdcd9389f3d8023f521f825dcb113ee030545e1b386
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD561a53e87c42e6721368e160b747090ee
SHA10ff160183a0e7fc72bc119ff4a39c90289208474
SHA256cdb1142017439c58729f99b24dfda2cec14bbf55b350fcf7f65764e900ca631c
SHA512473b6b853ce6d875bf9555d950f91a588936798a4a2d1e9d9c1c1dc637d98dce0770dcbfbefad134bcad1e71ffcc98f829dedfee6b280b31aaf589b2f957567b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5cf9ce6c482fb90411ebdaeff2f63bf52
SHA157ebae54470fcb6f9d8c8265b40431fc2ca491e1
SHA256a9b7831f303863ce1752ae76e4d54508fcb6d031f63785bc273c728b4285156c
SHA512cc6c998b160f028dce9081a22661e4d378cbfc91eca0ab776b58abed832902d2810546d391385ef34a46f141aeecb28ef883ac24503067a3b9b3c0ebe9b3cf6e
-
Filesize
1KB
MD5eadc3280aab2cb0f4d84a92d36957409
SHA1b707c7ae09ea59ede9923958c0d1fa5684e5e6c9
SHA256a488ea0509845028cd2d5b1822fafcf3fe786445b534971d354c411fb18d8d2f
SHA512ebef714ba62816c55a2c83565d17293a95ef9ded6e6c30cdfc14ff4d54ca1957f744ffb87f9ea89200678ee0e034005513e23ab95e58819a3c40d24e8f1ff574
-
Filesize
1KB
MD55e16026e49512573c2f3af3bc88d1d47
SHA1b5fb113abbe6b6927cab4846783f8597ab723af8
SHA256aa255e3e9d2bf1c306eb0e671a33787839dd109401b3365a363748d37262674f
SHA512878e45854335832aa8a7ee9f06d3fda1c07021639ab377b7de52d2ea36e4acddca67ea265ea84582aa70db6e511af816557d1eb0c8ba0cdb5f4af75bf98597ac
-
Filesize
2KB
MD5be0f32c22540bd0ba069c24d71da730f
SHA11cab239c92c1633695dbcda740cb8f29cb314121
SHA256180aae40383af37287082d893370f4f6777e5a4732b1a4ab820ca25f27f01d4b
SHA512406614fdfe7a122726f2e5f21547437d885bc01a7c1328980462cdc53a5e739dd866edd924b2bf97c5d9910bbe1c1483ba2366454271add7793c37b4312cd398
-
Filesize
1KB
MD52880d7dcf94d3d51bac41bfed9fe51f2
SHA1b7e258dd86f8368ac5274371a85be686f0984ee5
SHA256f607ff69d9dd1e65e56c51819016986056c5ebf49135f1f9d21e871612b81366
SHA512ee38c1aa1e8b2bcee5fce8ab2b113689248bf0887c3fc582b1e5e38bbacf0e3a79a73b4e9e0151c93c520a4591c56c1116c4f232d7f5da7e10df5e8f5302d7bf
-
Filesize
1014B
MD54d69aa69da703127586c8fa7983978d7
SHA13669d712981fbc6d7bf23bfa565c7988e71c4632
SHA2568afc665038f6543e22b4896dacaf276f1835f0eea3e2d8da5a92123e602ba88c
SHA5126d25279a4c462fe8db8e93e1b8b03770a968596d3825ad9fdf2d82790adc2f73551eb5ef28a745374344c2065db7fb1b9e34355f9e77029af3a4c022ac870ed2
-
Filesize
5KB
MD5df6861512acc2fb96b8e0b6d1b222d57
SHA10965bcd377774a2fa060e5bec963ee9b1f8a6b02
SHA256ab33c2ea800751df88509b5887c92b744cb11ffd730076f581ffd57e768f74fa
SHA5126c2ee353e33ed9459d2c9f0a6c6f9040a255d02f5c39e6cfa3b590fe108ede422cfe42f6db8e5585fd1b1caaa9498e1fe69c16c50f4e35c1cd01bbda6988bc43
-
Filesize
6KB
MD54ae9b7d98bf7a9970720dea12c95b680
SHA1784dbfc8d5865647976993ac973a9ec4c5b159ec
SHA2562e5bacf1e934fc3ea0c54475164a3d55ea5f6845d9c0b9cf0a8ec827e3281c61
SHA51294f7f19ca1e9513cda0c6f4504d951bbe16c39a0bcc4e1ac5c5c045703c43a8ced8bcd666034994595115fe9969df10838e1ea85c0eb7852982c99520219944e
-
Filesize
7KB
MD5d934d0ef3343231454335f6468413f91
SHA1b5ea5923e11443ec17f6ae40b705d9c5f14c884e
SHA25645108eee3b9f4fd3e0eb8b83857f8e05fb0533fd0a2107c98a6b69ab5695cdfd
SHA512bb6712c72d6a4bd5ad2b68958851fb9b30d716d83e0ebf61738b2962f87fa75604ed75513321663b5f71893a7bacd8aa0b03853a5f0bd56639baccb63c625986
-
Filesize
7KB
MD5a062f9cfa1e809cbfdce27765927c399
SHA13d4afa9e3bfef539b3219c8c16a0cdc446a1d11d
SHA256c91cc953c3b9c8c6c5975c477d72a03ea8b993241b6be4ff755c088e9a0ec784
SHA512b6f18aba9e247b68db21199ad366ed6a7481abdce4a1ff7398e8a552ed753ee520aea660e63d43c0b1cb2cd93918c03ce29f7b3c6b285e9acd6a55dbc9e0b11f
-
Filesize
6KB
MD53104eaad2d3b9a1b05c8d5f9f4936112
SHA1a8edd808e86bc45de0415ddca051e0664b64b001
SHA25612d3313cba93187ea814e28eb24c4d8d9f159bfaaa6f13eea77b3bf7d195c91c
SHA512746684b58504071039634b15e766ddbee0076ee57b3068b3fcf7010f4198db0c204425c4a32771992d5cab5516c38f51ea2e95a2edaf7f7d93373e4fe36e4f9b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5e3a1d42766723efb56879d8763a4f7c5
SHA1dbddebd33bda81b7951aed38a45449a00cde0126
SHA25649b0df6add254a7bce6f3cf6009e4c92aa31e09bb7cb0b7ac98ac8447f3b2482
SHA51278e18c1002c0b6b66aebde89736e2ea6d896b97fe16c4b63f0272d1b1bc0d3a4eef5981a4cebea563d4205d80f40881f992a06d24b22f3de07f7307f9c76cdff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5fa736.TMP
Filesize48B
MD5f7167d97fb9e48f258c7f4bd78491b07
SHA137c23c3a1232313523041594dec08cd7d036c1d0
SHA256f3c1fa44d266a51eafb312ea593615cd1438febe906759b69624313ee7dff617
SHA5129c96ae0273bee3ccb11a1bf91a0a9124967684689f38b389e351c1bf4efff86d20a0208481fdf8f394a994f0b74a96f127a85034eb2c58494c0619bbb3ffaea1
-
Filesize
1KB
MD55878e2c04ff56789d50ab2ae7914d84a
SHA1fa702a3b96a383b83764fa711f0bdcef2731b145
SHA25658990f9a980e4a17d5b3796890d6a9905aa5cb6b28e0b09e2eedf449bb608bcb
SHA512015533ce00ff19d3f24a942533d3682a7430e6be554677d3139e628d37b425a90f14798947c3a13941d23e4345efa5b38b421fdc506a0ead3cf71cacad6e422a
-
Filesize
1KB
MD593f822d9629811a079ea03b4fde47dcb
SHA119d319abf52511fbdf3263dd259353ef94575b5f
SHA2563114adbf4c02e6994f09b8873b91a6ad25b3103457990aa96bfc8b95fe665d73
SHA5128af0e18dc11afa9aec5da34b679e97645d989a0ca505bdec9958ea8417f0e1f31fc2775d04a3478d9d25fdd693198023b9a1b0f9e9e7acd1c9d3bea9c9fa3601
-
Filesize
1KB
MD51b2375bffda8aadf5aa8629e70f57e11
SHA1a38cf2afe6eb952c451b283654cf00dc1aa0757c
SHA256dedce23fc6e9ba3bc504f26332aa912f34515669671ccd69fc02d13bfde7c043
SHA5124b603e0a4618440cbb434da3933eb4a755369d833f3791f74210ce63c260d44cf08a6e3890dc2e36b6c4fa7461e0cbe5cfa94342e5c2eb33b837ecb4ba843bc9
-
Filesize
1KB
MD54289f963c8808419f2d65c56e1bc672a
SHA1c380a15341f14dc5c7941df9b19118147b8ca6de
SHA256c3bad9bd2c5114bd46d8e3c519d09c44afbc239e1acf7d48a16e2c576468a558
SHA51230671f33b8ac4f145f8025efe7b7582e58839a47d775416a3c6e861842d51eb91f6b20b05cfe08eafa63210381fd8950dabe06ff61e0fea9c89c75253527ecd4
-
Filesize
1KB
MD5547da60eef1dd859549d031876c01d86
SHA11170cbab9a0054cdaa19706976a1da7d1f51749e
SHA25653473dfac5aab03e91d9d0361238e2b65488ac7a1114a368d683f8141283fc8a
SHA512b24bec4a135f49973e70cd970fb36bfe81a9c849ec033e80388694ccb3adbbaa40ab24a513c6c191e931d237172263a3dff19538b16d6ca36fae41e04bea9869
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5bde4c3ee52299e5d74f824e33a098a89
SHA14e6281728057449a67938666e21d48b2b9bb13f8
SHA2560ba9914675e50d52f19b6f6364d9df5e6cf4975838b9896d1ba7263fc2300739
SHA5127e8e97e2e4596bda147ef2a566a347acb73cc31feb67f5f147edec4f5d6cca9a38190258552ed7eb4f0410b19cc0afde3e3afc52d13a2435ab85eca78c019fbc
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84