Overview
overview
10Static
static
10PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...n.html
windows11-21h2-x64
6PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...e.html
windows11-21h2-x64
1PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...ics.js
windows11-21h2-x64
3PlutoReape...rap.js
windows11-21h2-x64
3PlutoReape...ery.js
windows11-21h2-x64
3PlutoReape...002.js
windows11-21h2-x64
3PlutoReape...003.js
windows11-21h2-x64
3PlutoReape...004.js
windows11-21h2-x64
3PlutoReape...005.js
windows11-21h2-x64
3PlutoReape...006.js
windows11-21h2-x64
3PlutoReape.../js.js
windows11-21h2-x64
3PlutoReape...ipt.js
windows11-21h2-x64
3PlutoReape...pts.js
windows11-21h2-x64
3PlutoReape...oll.js
windows11-21h2-x64
3PlutoReape...804.js
windows11-21h2-x64
3PlutoReape...u.html
windows11-21h2-x64
3PlutoReape...sdk.js
windows11-21h2-x64
3PlutoReape...n.html
windows11-21h2-x64
1PlutoReape...n.html
windows11-21h2-x64
3PlutoReape...n.html
windows11-21h2-x64
3PlutoReape....EN.js
windows11-21h2-x64
3PlutoReape...ngs.js
windows11-21h2-x64
3PlutoReape...ore.js
windows11-21h2-x64
3PlutoReape...h.html
windows11-21h2-x64
3PlutoReape...oot.js
windows11-21h2-x64
3PlutoReape...002.js
windows11-21h2-x64
3Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/03/2025, 20:12
Behavioral task
behavioral1
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win11-20250218-en
Behavioral task
behavioral6
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win11-20250217-en
Behavioral task
behavioral10
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery.js
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_002.js
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_003.js
Resource
win11-20250217-en
Behavioral task
behavioral14
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_004.js
Resource
win11-20250217-en
Behavioral task
behavioral15
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_005.js
Resource
win11-20250217-en
Behavioral task
behavioral16
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_006.js
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/js.js
Resource
win11-20250217-en
Behavioral task
behavioral18
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/otherscript.js
Resource
win11-20250217-en
Behavioral task
behavioral19
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/scripts.js
Resource
win11-20250217-en
Behavioral task
behavioral20
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/smoothscroll.js
Resource
win11-20250217-en
Behavioral task
behavioral21
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instagram/index_files/f9e5c0ca0804.js
Resource
win11-20250218-en
Behavioral task
behavioral22
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instagram/index_files/lY4eZXm_YWu.html
Resource
win11-20250217-en
Behavioral task
behavioral23
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instagram/index_files/sdk.js
Resource
win11-20250217-en
Behavioral task
behavioral24
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instagram/login.html
Resource
win11-20250218-en
Behavioral task
behavioral25
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/linkedin/login.html
Resource
win11-20250217-en
Behavioral task
behavioral26
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/messenger/login.html
Resource
win11-20250217-en
Behavioral task
behavioral27
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/microsoft/index_files/ConvergedLoginPaginatedStrings.EN.js
Resource
win11-20250217-en
Behavioral task
behavioral28
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/microsoft/index_files/ConvergedLoginPaginatedStrings.js
Resource
win11-20250217-en
Behavioral task
behavioral29
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/microsoft/index_files/ConvergedLogin_PCore.js
Resource
win11-20250217-en
Behavioral task
behavioral30
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/microsoft/index_files/prefetch.html
Resource
win11-20250217-en
Behavioral task
behavioral31
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/microsoft/index_files/prefetch_data/boot.js
Resource
win11-20250217-en
Behavioral task
behavioral32
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/microsoft/index_files/prefetch_data/boot_002.js
Resource
win11-20250217-en
General
-
Target
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
-
Size
80KB
-
MD5
3ef789263e6a75cdc13166386ecebbb3
-
SHA1
24dc10d9381d31f83a807cd9a37547c50285e99e
-
SHA256
5e368070a41124048a88accb87b8576e5f32676d6cc6057748e2ba6e5774ed81
-
SHA512
ceb6ab6021f107ccd0d93bc67589f8ee0604130022fc2d87391f1487797745e28eb777cef03bbe8d2a42cbd320883420e524320ebbd4d225eab5fbf6badeb1f7
-
SSDEEP
1536:MmMAXA6ILKIHkVBV7p1jLnt28lM3onCFzB/OGYdOf+Z+lkQC6Ujkm:1XA6Oj8qYY2GYoRUjkm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4836 msedge.exe 4836 msedge.exe 3788 msedge.exe 3788 msedge.exe 852 identity_helper.exe 852 identity_helper.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 1072 4836 msedge.exe 78 PID 4836 wrote to memory of 1072 4836 msedge.exe 78 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 2600 4836 msedge.exe 79 PID 4836 wrote to memory of 4432 4836 msedge.exe 80 PID 4836 wrote to memory of 4432 4836 msedge.exe 80 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81 PID 4836 wrote to memory of 1368 4836 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\PlutoReaper\PlutoReaperV2\PROGRAMS\PHISHING\google\login.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e60e3cb8,0x7ff9e60e3cc8,0x7ff9e60e3cd82⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,10687897509679009266,1623002612086400821,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54815ecce34e90c0f6ca91c7e35be703f
SHA161ec0042ccee59f6bdf6b96eb9f412cc97717702
SHA2565db366717739338c23e07ca15aea2b48924a3b3ecacb214221239333b11ae7d6
SHA512751dfd6eea90fc4efb557611e8afc6ef1634c4e2bdd97f3c72638def09f644ebd8bf5696b9ed8379973106524d08c67188f7f64c0f941e8f95109920120dae05
-
Filesize
152B
MD553c68f0f93ab9a94804c00720a0bcd9a
SHA19009307d51e1fd60f9a90d77007e377c7f893434
SHA256a38f0777d4ca9e777191cc924c22eb1847ae805ab79ff224860e8c70d7f49422
SHA512a1d5b92fced821328a668fbfe9ad694b99c873ffa3ed28aa5bf1e8ef8054486289b5ddb26236cfa7c1ca0db993f306cdfc5878480b6a543aca1620075f77d670
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\68bcc007-4a85-47d7-a1e7-71081bcb7d84.tmp
Filesize5KB
MD599c97bb72a0e94bc67d63aadb929fcd6
SHA158c9393f69dd7cc08ebc563d7e3246479dd125f3
SHA25696617181fcc0ee07c7d13322e3a02982ba9735f90d2aa96985675831a896acfe
SHA512dff7cb4c731c4c72f0a5c35d3d9a4080ecb1fd61bf80366a80ae84ba026cdc9c77e264d1db1c776dbc65a0abd3497e644620c5cce774131ddca3c50e45e8f4ee
-
Filesize
460B
MD5aa96c47055ec70d9206e37360645e0cc
SHA145b3de419080397cae49a2fcab3cbb500a3e28fc
SHA256dd77b12272687c73cf8a46e3d83158110807e645dea0ce38d56e62598b9c6045
SHA512d94d9588dbe3b2da680a4e3b57de1f8d859229d1bf59089ebd6173d28bf8a03bfc624030678f1d8ab2ac0cee6357a6e0c55ff4d606d0a846d00403d76ac3993e
-
Filesize
5KB
MD5eefbf64501af6716b5b05e73a1bad2d1
SHA1e2d8e8f0f33ceb32a253149d079e022801abbfbf
SHA25614eea84ee29dc4309fef1e1b346d54f1b25a9eb613609e304b26ab9069cdcef5
SHA5120489f36adc96cd86933ae7c2397b0bd4323e210d8f1707e240d82a39bad9bef2e176cbe5dbd7ac552e49d051ab53e4bb710965bbdcb3f9c6f3cb2a4120f247f4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fe763cf3f89cef784afd9dd18da8660b
SHA1aab9f451472c46693448ba844e20fca418b9ad97
SHA2561b7e363849bdfab4cc9cbda5d42990a4be257e9f7b37502a56e7ff20f2944ec8
SHA51272bc0ca8b1b674145081fe958132e17c621f32f8285910beda9e927be16fe6e81d5a8b5faee21e1e4212f98ed84e05844c2e47b2a2f6b0c025fa348faf2330fe
-
Filesize
11KB
MD58aec867ec145d6e165bdb064218eb776
SHA1d35f9b9ab5f802b5090289765a60a2bf1a8c75bf
SHA256d72debbda7965b48b0dae14e2d9d222f3084e477caf78cd95fc05331351a32f0
SHA512e1d7b2ccf3b423b427bab320596fec845fdd968392a3d5dcbc9881abe8217efbc8ac1308e9ab393f086dafdac05ce1637c2c5a6afe6ad04abf829ee9bc7f62f0