Overview
overview
10Static
static
3Mal2/Comn.dll
windows7-x64
3Mal2/Comn.dll
windows10-2004-x64
3Mal2/QtCore4.dll
windows7-x64
3Mal2/QtCore4.dll
windows10-2004-x64
3Mal2/QtGui4.dll
windows7-x64
3Mal2/QtGui4.dll
windows10-2004-x64
3Mal2/Set-up.exe
windows7-x64
10Mal2/Set-up.exe
windows10-2004-x64
10Mal2/breast.html
windows7-x64
3Mal2/breast.html
windows10-2004-x64
4Mal2/libcr..._1.dll
windows7-x64
3Mal2/libcr..._1.dll
windows10-2004-x64
3Mal2/libssl-1_1.dll
windows7-x64
3Mal2/libssl-1_1.dll
windows10-2004-x64
3Mal2/msvcp80.dll
windows7-x64
3Mal2/msvcp80.dll
windows10-2004-x64
3Mal2/msvcr80.dll
windows7-x64
3Mal2/msvcr80.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
Mal2/Comn.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mal2/Comn.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
Mal2/QtCore4.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Mal2/QtCore4.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Mal2/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Mal2/QtGui4.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Mal2/Set-up.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Mal2/Set-up.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Mal2/breast.html
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
Mal2/breast.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Mal2/libcrypto-1_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Mal2/libcrypto-1_1.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Mal2/libssl-1_1.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Mal2/libssl-1_1.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Mal2/msvcp80.dll
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
Mal2/msvcp80.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Mal2/msvcr80.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Mal2/msvcr80.dll
Resource
win10v2004-20250314-en
General
-
Target
Mal2/breast.html
-
Size
51KB
-
MD5
32b7055e66439065de5ea5c8cc51ec80
-
SHA1
b3af36490fc9bec19b6041221191eadf582e14b5
-
SHA256
467459cf4763513e74820b221770142c560620d749fcf588fad4d38bb3d15cc7
-
SHA512
fc9903fdeae2e21cfa58e716dbc9892f3b4de4e81286a22ae9e3a084502d161d14257690fb1f0815327ffd3140bd0fa774683a120c32a41bbb8d849b04abaa34
-
SSDEEP
768:2XM8+KzTjc2gqtbminV1FibevwtqhhftLEayWud/DGC/QNZU50ugfCTgccp20t7j:UpzPSqh7vRXLExvrGdC0cK77GpN+/UI
Malware Config
Signatures
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_2080578960\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_144177367\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_2037160861\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_997364678\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_997364678\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_2080578960\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_144177367\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_1699097684\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_997364678\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_997364678\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_144177367\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_2037160861\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_2037160861\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_1699097684\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_1699097684\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_1699097684\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5028_997364678\_metadata\verified_contents.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866534830409002" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{D05F15B4-7EC3-4DED-A81D-06B28F755789} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2028 5028 msedge.exe 86 PID 5028 wrote to memory of 2028 5028 msedge.exe 86 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 1412 5028 msedge.exe 88 PID 5028 wrote to memory of 1412 5028 msedge.exe 88 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3264 5028 msedge.exe 87 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89 PID 5028 wrote to memory of 3868 5028 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Mal2\breast.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b4,0x7ff9a119f208,0x7ff9a119f214,0x7ff9a119f2202⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2232,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1836,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=2420 /prefetch:32⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2396,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=3032 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4208,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4372,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:22⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3968,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=4008 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5396,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4008,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5308,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6044,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4536,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6192,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6156,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6592 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6240,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6132,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6188,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5080,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5068,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5056,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5224,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6900,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6872 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5820,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6536 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5576,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5436,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5552,i,2817865578192159952,13848037059210962783,262144 --variations-seed-version --mojo-platform-channel-handle=3352 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5aaf0571cbb6ba53dd688aca2c92a2e79
SHA11c4c839376a23b7a1cb63ceeb9945d912899133b
SHA256625d5d29220ec460a47b0916c33f72789ad83e725434a42e978ae44910ed06ac
SHA5124186ee41e991285503bcb4299efc9e1f1a85865b91740c5c7cfdf8a757d79fc379856833aa63e60d7b1fe2a52772b6f50ee16cbc8e4d5ee021f3a6665f66a2ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe580e05.TMP
Filesize3KB
MD54a4388c5fdcf248c8a16da033055b611
SHA1632822dc2607d94cbffae4a948d9b266caa02eac
SHA2569d92e9c4af01921d82ee71176a1d4d7456bf6138f97978642f8c8818b6b8b851
SHA5127e92743b4963a72065a3bf4302de9f5a3ae45907c4f60b4adc36d5c72801fb583981f32c99092d4a3e5f5ba12826349bafcf4cd575af28801dc04439bf9b2e65
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5e82327aaa5025dacb973aeec20dfca36
SHA1978a23860ed583f41438cea59b5730c2b9c7d7fb
SHA256f59b87acd5fdf1a6efd43a1391b41213ed78681831ba193161fa2a2879bcd014
SHA5125add93f9af0b8b893c89ccf1c942ce40b94c3ecd5585b578db268e65d11bbbf870d5a6a7131d2b9227e214bcd2ee2e002f7f04d13323c31b9ec64f296a553449
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
13KB
MD553811c67abb94605d704e34353f0f652
SHA13cf17c9525bee290ae798104f9c8e33f93447523
SHA25686cb563811d8e382762b087342f55ff8aabfb7cd18b1cd8915a04f5752c0f5d4
SHA512522b87a1288ec83bf7b5d597911625f0ea4c521f9b1dc16820a7c2b1521f71ae3964caa5834b5088809a863a86895f787387ff884c9dcb83f0488f65fb710e75
-
Filesize
14KB
MD5edd37d7feacfd20982a20acb067f1571
SHA194fcb0f20ff3d304e5710fe800a66dd6ed9f0c85
SHA2568e930f65c510fc4bdbe48d9b912557e3c12357edd442e879a150ebb1c894a27d
SHA51254a33b95a1631a6c26788a71dcf202b3ab0bcf06a6fc81f16d0994de66e6fd8cc927dcf3d32e11082213c6669dba5f4af50ce690acdbdca0a79b1c53ea9e9e14
-
Filesize
36KB
MD56b0b5af2f2ef4f051b92d63db0cae1a6
SHA10ea6221fc5bad32779bb8e7af51da2928afd0744
SHA2569214c91e683a2cda429c0e0db6b0ea128563e666682eb835aaca2d75f5edb216
SHA512ebd59f221a6172dc60469a9ea77dfdf8b69e65bed66a59c34150c6d5e24345ebefba7b54035be29aa83e1dcc17d01f605edb7bd173ab005c8976d8f2686b0f51
-
Filesize
876B
MD5a05d0220dd018bd68e27445ef8ee9880
SHA1a059b90ad6e856793cb23ab4cdbcfb76464216ec
SHA256ccc485395e0b23c156c9d08f9177e1bca5b9df11b671c8d7b1da02d364be17de
SHA51244dcfbbeb0b1bcfd440ce445cc2bb85a17dac2b6bb46e15d5cdede4a83ae9b7bc21a060c9a51e5bc487d7cd96b87447ba6bcb84173cf9651d679d114c221dbf6
-
Filesize
20KB
MD58816bf28be1f2fedf7edfa407d1eef80
SHA183ed8b4960b492718ee043c645869f1e51bc6a97
SHA25646345c1adb7eb59dc56c8351dd034d95e9f6c5ffd6e7e26bbd12d54446caf318
SHA512586bafcf24b7d33424c9427122f4acc8c2c8313a8ce19627ccb04773231a3bb7f30670d8a6db2eb483829cc037bacde7bfc1f0c1f4f5eff390412ef343140fdc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58a92c.TMP
Filesize467B
MD5cd90b6b968d23a8b18b78f3fb03c0290
SHA1f9c0019354c65069f18ddd8d453c3978b917c433
SHA256b6b245c4dd8c8e186eb847c352887bd7cebac4d2c32b552dffa1c767f4422fbc
SHA51298fb43bae932ef5bff53c0fca959ab6d679bb2a708f8c1d976c15a1f0ff1b45b42e2b27dc6caac3778a7a329d974797f06d3ccf4e0c2e46909132cb0ac11cb31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\dde9562b-08a3-480b-b05c-352284898d58.tmp
Filesize19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD565ac85bb347e9c53e6b0cb1f26006b43
SHA103cbd4359bab9f2d91b13c0bd4b4bebae39eac97
SHA2568064eb325f55a83e0fc36800f7cbb86bba74587a323dd3963c3b70280bb6ed78
SHA512fff6673ae15195cae5e11a927bce8b0c54c2211d9f1e11f8eae288e0d2adbbef3546c8b61fc9c2ea97652b807d5664f0520de6ef759992dafbda73c96f2bf9a9
-
Filesize
7KB
MD5dd5a041bd46e75000e709a1226957f1a
SHA161c563e05543764379680e1520c7cede91fbbc86
SHA256979813ec8cd1dc3df2e0a5cd157fab31ac3c68d9c167bfffee95e32188376a23
SHA5129ba26f86a98e5f32efa5e5f15af82d4b4834f67f632e52ffb611e49f18eddee491a3976e87bb779a971aaf9dc2a7c15f955761e5f4bf2f037f41757a5f5b2dd0
-
Filesize
6KB
MD55613fcd4bb8a38a291cbdffd276eb6b7
SHA1a0e9b6bf0dd5988ce3cdb30133a8df34c394aac5
SHA256b9cae10db276f51e2659bfb038883a8339d82ceadbda50bd313102e3a6ab6f05
SHA51225a907792b0b55ff57d80c64b56b92bb1083c8407c98cf951189527ec9a9cdae1e479bcfa3f275ba9a97b665d8a2d2747f5b3cdc1fc8b8ebb36a5475e30d0065
-
Filesize
34KB
MD5f17ec5e91fad2490c88becbd70d9590c
SHA146cf1fdd685d502575fb6f9bfcc11f3b1247885e
SHA256a6400fedc706d2f3e249658ef38cec78cd6f84d0875c543baa24ac4f2beb0ab4
SHA5123af595e36658ae67b843eb65f30290d66be4ec00195a2021cb29b7137c5cd6d2e42334b41e4f55378780afd7996aeef45271a89737eace2b0c608a1dc648cd5d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD56b47cd7225cdde974136824102318361
SHA1a53d01646df88e71f8a529226dd567f0596be13c
SHA2560c52f97bb2b250f5ba8c8113119e36e3cdf20fe112ed9d5209b52226b18b07f7
SHA512205eabc76bfa77bbfddc148f38a91c37025603f0f26712ac539d78ca293d70a7b07d9b1bbc55a5357d072406f8fc069cd14a87afed1e87b0575bfde3f333e74e
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5028_2118198068\bd48f56d-f0d9-4678-8172-1ffd99c75ad3.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3