Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/03/2025, 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shorturl.asia/vRdi6
Resource
win11-20250314-en
General
-
Target
https://shorturl.asia/vRdi6
Malware Config
Signatures
-
Drops file in Windows directory 36 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Filtering Rules-AA msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-DE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-IT msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-RU msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\auto_open_controller.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-ES msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\shopping.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\shoppingfre.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2007431917\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\edge_confirmation_page_validator.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2007431917\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2007431917\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2007431917\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\shopping_fre.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1124313856\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Filtering Rules-CA msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\edge_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\product_page.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\shopping.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\adblock_snippet.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-NL msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-ZH msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\edge_checkout_page_validator.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1124313856\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Part-FR msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\shopping_iframe_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761530891\Filtering Rules msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_776845612\edge_tracking_page_validator.js msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2007431917\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1124313856\manifest.fingerprint msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866095010113305" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1678082226-3994841222-899489560-1000\{73C0C7B9-6588-403E-84E6-94E80950D6E7} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 5796 3040 msedge.exe 79 PID 3040 wrote to memory of 5796 3040 msedge.exe 79 PID 3040 wrote to memory of 5620 3040 msedge.exe 80 PID 3040 wrote to memory of 5620 3040 msedge.exe 80 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3244 3040 msedge.exe 81 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3664 3040 msedge.exe 82 PID 3040 wrote to memory of 3664 3040 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://shorturl.asia/vRdi61⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ffbc988f208,0x7ffbc988f214,0x7ffbc988f2202⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1912,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=2384 /prefetch:112⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2240,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1880,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=2404 /prefetch:132⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3448,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4796,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=3944,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4996,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5196,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:142⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5636,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5700 /prefetch:142⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:142⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6424,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:142⤵PID:5448
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11283⤵PID:5596
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6488,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:142⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6488,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:142⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6492,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6560 /prefetch:142⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3412,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5152 /prefetch:142⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5132,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5136 /prefetch:142⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=5932 /prefetch:142⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6224,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:142⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5980,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6692 /prefetch:142⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6820 /prefetch:142⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5908,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5960,i,7320565900204942834,2056863215184044509,262144 --variations-seed-version --mojo-platform-channel-handle=3384 /prefetch:142⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD519a88bad99bffbae6102e191cfedd75b
SHA1df476b325df883b73eda1b2349bab45aa22e808d
SHA2560d576dfbde1712b7288e4561e3eea75ffdad84dc50a77ceb57a6e9c37d60465a
SHA5129ec5eb487d8c8fc8e283a94bd43afd740edc4df6a4509d83629416d040586bd42330eb0da6dd41ec1e5550bce9a6643319ff8584f8638a9cde9042fa406825fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD54025b7cc6bbe722b72bd284a22225596
SHA143dd5534ff50a05c7b56cf7dd80c782841a518cb
SHA25626f70e82a0b53ec96ac989b80e9bfb7ed321fe29c3dc150345fc0fe247c84cfc
SHA5120ab3618e779d95bb174cb5e6c6f9c24b270d4c3617aa073951a66273f953f13313dca4f93d87151abceb03cc93f7ff772c2355479f52812e4862e66381cb077f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5791c0.TMP
Filesize3KB
MD5be92e0f7f5962846328d4e1e94df764d
SHA15ea6d96a588a01b9c1cba90392e507442456ddf1
SHA25625f2ed7241f614d1bf7e9daca12c4bc448aaa25c20aa7edc74c37f4ef557be34
SHA512683a741dc86aa9714abc2d0ccc2c16bb9429cfce3de5b3be862c32556992f88eec5160c71dd29ebd2b23f943be226b5946c58d7257034908df3532fec4ea0aaf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
7KB
MD5e0c632bb17b9e6b150ef2b7ce91367fb
SHA141cb7d71f8495b677439e99c8a131d1185b1d91a
SHA256f181bdacb76c01f517fa2d0b30e1ffcfc4e1f4c9da6c54cdb2caf049017dfca6
SHA512d9428c937971df9889980890ee65f052efbb897369435fd0b90e4aeb57edcb60b6d8b7f0e03ea07c0866afdfc10969111bb1a848e8e5e07d25217e3d85d87e69
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5eed5d2390f78ec13b0e35e52435695ea
SHA111dc23c993096c136dc65caff9765632f463a615
SHA2563368a905ecd23ad9556e626f8fd930821ad8be71b2a7a66eba5454138cd22cb2
SHA51201c7bd81c7eb31a67e7bca4ad4057af209d3b34102af08e7dab035c00d4d26d6004d4f54ac69a0d647289a48c2de8f2468052db1f7acfb9850610f985285d46a
-
Filesize
16KB
MD5b3a368d80d83341abf91ba5237d5dd33
SHA1f9b80070049ab6adfb433ace251cf522446df3d1
SHA256339fb548ed3eeff9ac4de7fac0ac41fb455de045830fce217e03d4fc8d6a27e2
SHA512dbccf60688c430312956ced0da7e5875add1cb875caa20e4d2f90fdc86630a0f2e369c4a408ba98ef7a658a98921927b3a972fb019104ef5768f8540870d3184
-
Filesize
37KB
MD5041eca073fc7fe58a6fc4ac728afeba7
SHA10688efc2c905405f40f7fedcc9e7b78111198748
SHA25636ba4b6336e4f233375618f6de2b18d363d039a2e7c44f8ac3acfcfe0bb672ce
SHA51260bde08bbf64e6aeb829a1e376a582bf6d65c47bc92de431f8d968496e0266335cf0e0e0428cc9dc1960e3f8bd40af9e93bb104e711f26e7c908950ce3dca4fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD517f9edc9d420d82b73b169a9e9f4acce
SHA1117bc80844ac389d0c8c04bdc7663e270cbb5e44
SHA2566198c7a2e151d05ae0a7a9d36d27d7ff891daf18cba8293d424079d6d344112e
SHA512df8d6997101584222a1d15ae55f6aee5854e123389fd05a68ef7afd8d05781f81691090092affc400fc25a7bad59af09125d5bcf0af14d33f3b50e407805a7ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578b19.TMP
Filesize72B
MD56b7f099eff29e9f83a1a755461758cf9
SHA1ec19e2558d61a45aa7649cc5b42a22669e02f70d
SHA2560db4f2c50ee72ff84cd20935fd6b143450f9b0437486f081c6eefef952b0452a
SHA51234839f79144c087f368403cce51d3ee88e69b721eb8909750669065af6b8fa2e9fe39629bea775cfb3fa5aa4649a92672b2073100e861bf5b7dad0d9e66a01cf
-
Filesize
22KB
MD57135686a0a00099224e444bbdae641fc
SHA130f345529b0b2456b4c9100b72550c8e6c1af6d6
SHA256f71fdb2c2dafd869432d4951019dae24b6aa28091c6eef9b0dd44daf7ae5d4b6
SHA512a0403556f71484c542b3e3743312d1aa1e163b7a8114672bf0603da699777223d60861cb20d5d4226338426f3e08c7c9ade7a8304930337511dbb5d3c5c0d119
-
Filesize
464B
MD55c6c8dfcc9aba2e50dac2b7bf436979f
SHA18b158a32ad5f6c56c4e2d7b6074a67d330a11235
SHA2564a4c32a14cdd2514ed112a9f32a601dfa5f202b23228cc0104571b99e3fad05e
SHA512b0510bfc151352e7b32c7371b8363b8cc2ef9b181a600ba4afea7f2438ca1aeea26425e9454667513018c0ebeab11302f25c706d4f56123b8a8b0554e2200c78
-
Filesize
41KB
MD530b926a029d669efdac9203aad4594b9
SHA151092cbd2ef74c7d2008cc25e5c5980b02580867
SHA25619547778548de0f306c64c0455583a275164e9691a21a53936d044f05ceee3fc
SHA512d6b9f4d068b065d8559db8c60a6ec859949eb896145de3d0c2627de7e403da48ba5137c11ce6e1ca3ae2f24d048cc9fd3e1ed990831ad03f9f45537fc11c76b8
-
Filesize
55KB
MD5a7efb36a121e9e7db4e4596929802d40
SHA1d93ba8baf3e0e09d47ae70a4d8c8ff66072b7825
SHA256f32b7bb9a16cef62faa4549fd4867720d9d3242a5ba506e9c790050d7817f846
SHA512e198879007f894b307216f626ee2887d3513c232f4c540efdd12edae19c99c7aec1acad0310d8a48a87ff72a39b5787ac18fb5186a427a1ba6b5c0beaa8d3a8f
-
Filesize
50KB
MD55346b5f4d2ff93142b1bf896da7728e2
SHA17a53d95906cd4c2d13ea9fc5899547100fff86ba
SHA256d25a8e823df6eadfa625298ea4932a86d1ff9f0cf5854a7183ad2b4c8953f41c
SHA51219becc8124322736a2669ea91eeab31497391f2c19530c5b271ec392878ebaebaaa1e8169b54df9540028d8c2322a336dd6b9854a6b123d75b577c77c18f64fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.16.1\typosquatting_list.pb
Filesize631KB
MD5c3ec8bf0a625c2583833a3340825f1cb
SHA1582054710a312897117128ed59ddadc983525eb6
SHA2567d10e035e0b2e152a1fe32a92b0b34295a979f7db2269cfba69d4aaf3401b77f
SHA512175125259eb39225d0584fa4e3c5cbfc66bd22646cf32677f0eb7514a0abeb2c08118375210a69207be85e6e7ebdd9b6fa9a967d3c4ecd40ecd514e306873c6e
-
Filesize
118B
MD5ffa5fcfeb00002903f6cf667e9fe6a3c
SHA1ad765ea344c8cfd95a591da8259fe412e52d13b0
SHA256dd0679c622258bad2e2ddaec3470297259dc68b55b8c4f4d7f2f28a378826217
SHA5128da9b780e9bc6785efbd56b51a4decc8703c9f1d41b33469153cc0aea8190c1b6a9001128c6022756a66ee539086ad6f787da84b6b7082dc51939077365e7beb
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656
-
Filesize
145B
MD50df2306638bd60162686e9c4bafbd505
SHA1ef9e16bf867f7950d5a30172e1d34d38686b0e72
SHA256fd7b554588c5e72506a0bfed89bc298911a5649b9f5168ad7c1804d1c75de42e
SHA51273fca229097631104cf352061d62455b6c5520bf59777520165719d2368b0e77f3ce66f52873fec53ac60e35274bf397ba321bc62610f0b7b172a7c5c4975174