Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe
Resource
win10v2004-20250314-en
General
-
Target
44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe
-
Size
896KB
-
MD5
9a52aea2b0c41150776e760873f1a7c8
-
SHA1
e7b085a12af034ffdec85e957989c47207e54e9a
-
SHA256
44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1
-
SHA512
033e995bb184146abcb06657bd7094c4900ed4b28395f83c992950051442f24f39e6765ecbfca1f6fc5340e0ac204964b8b0b5c053571cb5eae628ecfcc02326
-
SSDEEP
12288:yqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaETb:yqDEvCTbMWu7rQYlBQcBiT6rprG8akb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2856 msedge.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1453886808\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1316188196\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1316188196\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_497870671\kp_pinslist.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_497870671\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1453886808\well_known_domains.dll msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1316188196\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1316188196\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1316188196\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_1453886808\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_993063185\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_497870671\crs.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_497870671\ct_config.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_497870671\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_993063185\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2856_993063185\typosquatting_list.pb msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133867226667386915" msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{2FCD89EC-B2B4-4BBB-97F3-632977371609} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{A9160A7C-866B-40B5-83E5-FE9BEED251D4} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5292 msedge.exe 5292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 2856 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2588 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 88 PID 1508 wrote to memory of 2588 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 88 PID 1508 wrote to memory of 2856 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 90 PID 1508 wrote to memory of 2856 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 90 PID 1508 wrote to memory of 2456 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 91 PID 1508 wrote to memory of 2456 1508 44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe 91 PID 2856 wrote to memory of 3128 2856 msedge.exe 92 PID 2856 wrote to memory of 3128 2856 msedge.exe 92 PID 2856 wrote to memory of 3612 2856 msedge.exe 93 PID 2856 wrote to memory of 3612 2856 msedge.exe 93 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 1452 2856 msedge.exe 94 PID 2856 wrote to memory of 4968 2856 msedge.exe 95 PID 2856 wrote to memory of 4968 2856 msedge.exe 95 PID 2856 wrote to memory of 4968 2856 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe"C:\Users\Admin\AppData\Local\Temp\44a6d3e1106815ef095ec5836b8a304ba90876fd1826d67288705cf6171831c1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2a8,0x360,0x7ffa5836f208,0x7ffa5836f214,0x7ffa5836f2203⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1876,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=2296 /prefetch:33⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1404,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:23⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2592,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:83⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3512,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3520,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:13⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3508,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:13⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4028,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=4696 /prefetch:13⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5344,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5380,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:13⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=5196 /prefetch:83⤵
- Modifies registry class
PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5732,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:83⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3600,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3720 /prefetch:83⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3636,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3676 /prefetch:83⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:83⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6512,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:83⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6512,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:83⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=708,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6580 /prefetch:83⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6556,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6744 /prefetch:83⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6564,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6756 /prefetch:83⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3672,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6932 /prefetch:83⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6084,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3796 /prefetch:83⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3228,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3012 /prefetch:83⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6648,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=3796 /prefetch:83⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2880,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3384,i,12618618057932197678,7498147202608028998,262144 --variations-seed-version --mojo-platform-channel-handle=6068 /prefetch:83⤵PID:3908
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
141B
MD5811f0436837c701dc1cea3d6292b3922
SHA14e51a3e9f5cbf8c9c96985dabe8ffc2de28dae87
SHA256dbfb38a16e33a39c35ac50bd81782e4608be14954f1df69ac8272c0b9ce87a5d
SHA51221e7bf2f8333b2900bcbcb871ede14684073249597d105095dc7d3f101e7ccc326068732f11d4a167365f245a3f2205793f520c7666d7f948e70919b40b43d35
-
Filesize
102B
MD5a64e2a4236e705215a3fd5cb2697a71f
SHA11c73e6aad8f44ade36df31a23eaaf8cd0cae826d
SHA256014e9fc1219beefc428ec749633125c9bff7febc3be73a14a8f18a6691cd2846
SHA51275b30c0c8cef490aaf923afbdb5385d4770de82e698f71f8f126a6af5ef16f3a90d0c27687f405274177b1a5250436efddd228a6d2949651f43bd926e8a1cc99
-
Filesize
118B
MD5acb8ebb43624ece8dd7964092455d2b7
SHA17c61f04b419f927f98120afa18d8553513e2a0f6
SHA25655b2b1fd2a563b240179fde6335370f5e22068ada77b5dc5af50bbc379c72953
SHA5128e6c135aa19d6d21b32c6e9c0727ccf3df7e8dfcaf49e3f0ce55af9b53748188949746d69d17cdafd9d77511b1550d970289912a33b3d9c4daed8837762d91c3
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD55c7c6df0e4058f78ef67a3c1d0785fa7
SHA1d882e22eebdc52dece2217190dff3a7181630199
SHA2569d0274ce744f9428db96e746b71b3f8a89efaf7390515a6edbdb7138aeca4a57
SHA512babdabd6f50ad5f7c1b78d32fdd6853eb0cea9d82f20df2e355496067824fc3e4b2c29202a38640e0146283fc86a40e03634fcf936e91fdc059923761b723da6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57d409.TMP
Filesize3KB
MD5fd92d2a72bc9768a7606f48ce0232a28
SHA14e91b1ec927127f86c377866edc71a1449e0e357
SHA256a4cf5f7943b726beac7c71aa5501e4c4012a4e89d8da1bd0694951ef4fdb662b
SHA5120e5645704278fa896915c881f42ac0841390b0e6c372954ade96d1325a4d21ab1204a17db9bcc5e4fec0f9cc1f986f5e5e6f9e7818ac390b371cbcb8363d8ced
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
6KB
MD5201e0166df4e4ec66295bfe6f16dca17
SHA19fe41263c875d1f698356745bdfeecfe8f4e58a0
SHA2565236a319d427a7f241e79a62e688cb4f69ec5ae8ec1832987843cf68e19931d7
SHA512a43e88f075a6d670f1f89c2c06ae5f63bb6c3c223de8dc9ca639e4c44758f8058b09dabaf07450c8b58ae42957b4e9d9b425ef5d1cad5766a4ec6ced18dac9e1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD516d17a8fd5b8a4d7232c2e7f00b6fed0
SHA1b914612ce4dee7979ecca1c762255bd9fba39dca
SHA256f206d38acd2ebdd449456e34f393d5c42fd938c11d8aca2d5ac026bd9afb8f04
SHA51229dfe9efa2ea08e8655f49558fc12afe315be69c867ae04356f868d5362397831c02d243b9b658952dc8a6fb1c02c794f4d5b8d985cc547d230c8abe3f7c11a0
-
Filesize
17KB
MD58db1fcb5d8906c0f46cc9bc79e830e29
SHA1cdda8e04e0d3178486dfae8211636655cf89fc79
SHA2563a94ecc2a81b80abe8a5c6f9c31b18bab50c7e56c0943ed1a8f0bf8cc7ed1776
SHA512dab01bb56f47b8dbf376a3317479102b76c1aeb0f5bc9d897770153503b03cc1cd1fcc1a4b38100cdb887e2b190e14b884128c2a81558ef94ff9824e0c612977
-
Filesize
36KB
MD5f7b269a0abfe497cd5e5f2011ec5ceed
SHA18a4747315b30d3ca1683b46d234ad37ff282cd2a
SHA256d9c7678af876ebe9e6de575921253a4fb1bc6f7a801585328b08d179ba81010a
SHA51211d5accc701ea022fef2c1ed73a2d86266d2a32ffb7d1b6192a9505d2d8fff9e989a6763fbfe9ec371e883785237cfcb445d38e9d9d12ba0afd4a8b90b2529ca
-
Filesize
22KB
MD5868a7c9fc04593b571a666abba9e2eb2
SHA1ad22c4a887f7b05df1b712d8d993ee3228b59099
SHA256f37f1ba58c7d6ed3afb0c19063ff6f68b6ced99f0d5eb5f512a321b99d78f013
SHA51208d9796c7dc2129a70577b2314a40abdfced9f3864ab905a6c8da7547c34b4cc28a795e9ceda6db25f71cdaded745b0e86d67e3929493a2161ea76a046177dfe
-
Filesize
18KB
MD5eb40b08a5debb5866e68d72e623d1fc2
SHA1e296354e0a3f83e52813c34753a719b6c9db26bf
SHA256234575042385591eeafb1ca7585c95be0241b769159e3e387924aa19600f97cc
SHA512ea7b9ddf46dc6afc6888aebf1f0218a6a006198992654d9ea03f43b552ef4caa3133ee795f3092b82251fc296b5ab288df72efbafd3691fdd63c721204c78058
-
Filesize
900B
MD5d6514ad116177b10770a5c1d3390b008
SHA128911df22a3992880ed56020062b058367d7f2ab
SHA25639301911c2139faa28a70a1895682d5744b40d8e192406dbdfd44635d00d66e9
SHA512ec9718540224da64c85bb8a376cbc3457454457d67541bf87e7841043c114eedcdf5637e0b8566ef224bcf0311729e61748ba832f2a6fe5cf215481b79412fa8
-
Filesize
467B
MD51ddf135bbe3e771fd59e74f768b24c26
SHA1ac9c0ede5b1d1a54d3ce3c56a54c26ce2ccaf6ac
SHA256e84ea54323209e2746a1058f5d3c574cf00d078fce748d0dabbd2f75e4519d00
SHA512fa0b58363fa7ab690a7c955f97e048667444157c766faba5012242eb2d129e336585cdc58a556897ee22ca718909482abdc36c26c02cb86f00d905777550250f
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD5a12b8f71fc89962d8446ba68df0476d3
SHA1270e6aff00fa75fbfd7e3e30c6246e2fba594485
SHA25695bfeee0c838f235915e14829adb6f1d672ef48003f84e3340d77fdfb7dbefa5
SHA512d2b281b69c1b5751f33e302d46e86111b3a909ea3a3d5c02902b881cf7e1273ce4198e013174f1d19d4e72fff14e9373afbb8f8c4938767f131ea2db485c03f7
-
Filesize
40KB
MD5362393aff871feaee5f9d58d19ad451f
SHA1a799c612c398bebf43e40e067c2ec2c787041f4d
SHA2564fa7935a1c5f5e00e0b2ae68baab6f21fc578e7d7e0a8a71199245e387df710a
SHA512bf68dc63c913bc6f897fc487f9ca29bddb6ee8da260fa0560305e466d5d2952790ff081530d606fc4d292968a788e412835e1f3c9ba4ed0fb4255446dbbe1aa9
-
Filesize
40KB
MD51c469931a7c16f6d8b0dc0d21dfb26e2
SHA145662de51c7a0d5aa9e8aa63e047ac320238dbe8
SHA256d3535dfb687cc7132936bf3cefccfb45ccfe620ec82dc8c0ac340d406c99a652
SHA5123edf679a9c814143521e925a5a233dbd644f2ca2ce5c1e1c132e749928d64048207abd5dec0c3455a3af53958ae7217cd0a7100eb45513b4067e65e57e7e8655
-
Filesize
49KB
MD5591d046166bfd68f6e869b24b985316d
SHA10d8b7506ff656edf9fb35e32f1c19c9187044d60
SHA256faa669885972fc73f9b18425189b8a6f596911308b8732548bcaf68bf595a00a
SHA5122f1d89d4d52ac15175f1f86c9aad038b4ee769e0289a167b31322166a09b3157273da73866f74bfa703871b53296e1bcda0330f0ff01830171bee732ec582264
-
Filesize
289KB
MD52b59269e7efdd95ba14eeb780dfb98c2
SHA1b3f84cbc37a79eeecb8f1f39b615577d78600096
SHA256ff2ced650772249abb57f6f19c5d0322d6df22c85c7cf2be193b6134e1b95172
SHA512e4b454db2248021e0d198805ea54f1c0cfd84b9716a9348b1d0e0acb7c6fb5dd0839e532a5eb6d4410ab759d6688dd6cce8375ad55a150d738d280993142e9d7
-
Filesize
8KB
MD5811b65320a82ebd6686fabf4bb1cb81a
SHA1c660d448114043babec5d1c9c2584df6fab7f69b
SHA25652687dd0c06f86a2298a4442ab8afa9b608271ec01a67217d7b58dab7e507bdf
SHA51233350cce447508269b7714d9e551560553e020d6acf37a6a6021dc497d4008ce9e532dd615ad68872d75da22ac2039ef0b4fa70c23ec4b58043c468d5d75fd81
-
Filesize
11KB
MD50779206f78d8b0d540445a10cb51670c
SHA167f0f916be73bf5cffd3f4c4aa8d122c7d73ad54
SHA256bf0945921058b9e67db61e6a559531af2f9b78d5fbedb0b411384225bdd366ec
SHA5124140b2debe9c0b04e1e59be1387dca0e8e2f3cbc1f67830cbc723864acc2276cde9529295dcb4138fa0e2e116416658753fe46901dfa572bdfe6c7fb67bd8478
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.17.1\typosquatting_list.pb
Filesize631KB
MD5094ca661fb20ae7e5c26df780e0f7ecd
SHA10cc79e2fdf43962d9597b7eec7b34c8983c3562c
SHA25676f100a3d96cddfbad67460eb0db1a8877a53c8a1881888b208011cd3a9d5726
SHA512088ca8996eb3bd02f5561b026a9e36755c915d19eb9ae768ee3949491059b1c7e34117b72828d843131df50456c6a162eb2cffe74fd38c273708cd4ac6fda53e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Well Known Domains\1.2.0.0\well_known_domains.dll
Filesize572KB
MD5f5f5b37fd514776f455864502c852773
SHA18d5ed434173fd77feb33cb6cb0fad5e2388d97c6
SHA2562778063e5ded354d852004e80492edb3a0f731b838bb27ba3a233bc937592f6e
SHA512b0931f1cae171190e6ec8880f4d560cc7b3d5bffe1db11525bd133eaf51e2e0b3c920ea194d6c7577f95e7b4b4380f7845c82eb2898ad1f5c35d4550f93a14b6
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD558686b5bd76df9fbbaecc2080b041c3f
SHA1896fce1199517629976657f2b663e5b207c21002
SHA256c5d3b84ffab75a0754f5dd653d62e19ececcad0b29fce9ea19a5ecac916583dc
SHA512608a1632273f2980b4622736929e8da78619b93a000e537b34072931277920167ef0df0a461d066ed1603c75b9566f967b481d85c586f561a65810917420d7a1