Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 16:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r.oblox.kz/users/660319945/profile
Resource
win10v2004-20250314-en
General
-
Target
https://r.oblox.kz/users/660319945/profile
Malware Config
Signatures
-
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_986353484\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_986353484\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_986353484\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_406271175\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_406271175\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_1609040472\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_1609040472\Microsoft.CognitiveServices.Speech.core.dll msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_986353484\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_986353484\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_1539752851\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_1539752851\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_1539752851\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_406271175\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5444_1609040472\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133868755470103734" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{5E88D1A5-5F4C-454E-B052-771F29BB586F} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5272 msedge.exe 5272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5444 wrote to memory of 5960 5444 msedge.exe 85 PID 5444 wrote to memory of 5960 5444 msedge.exe 85 PID 5444 wrote to memory of 3484 5444 msedge.exe 87 PID 5444 wrote to memory of 3484 5444 msedge.exe 87 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 5060 5444 msedge.exe 88 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89 PID 5444 wrote to memory of 3092 5444 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://r.oblox.kz/users/660319945/profile1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2a4,0x7fff3b82f208,0x7fff3b82f214,0x7fff3b82f2202⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1788,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2124,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1904,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3572,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3388,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=2696,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5192,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5432,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5356,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4372,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6376,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6632,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6380 /prefetch:82⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6632,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6380 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5100,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=5340,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6400,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6668 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5360,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6944 /prefetch:82⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6900,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5612,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=3920 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5388,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6688 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5996,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6984 /prefetch:82⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6132,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5956,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=760,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=6536 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6600,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3272,i,18235844685019518461,17419465081687966703,262144 --variations-seed-version --mojo-platform-channel-handle=3156 /prefetch:82⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
118B
MD51c86577f2cd4d32c2a66df8ea2688d85
SHA135a17132f6e9fa4cf9f7cfb307870eef46b697f7
SHA256312e962260bb133a4c811348a75396477d2bc284701393137cbdad971317578c
SHA512ab8583a6c1e0f34f937296d12b9c045c99a8d5eb61fb36e797940cb0bd65f952eb99cfcd44c56ae45d6d14ff330bde0bfbd9cf5c18fb8296bf68a64b38ef7594
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
105KB
MD5da7fcae4308766368611b35916374158
SHA105a209260fd46aa423fc8dc987f4b1730efd82af
SHA2566caaf6eb26118dd3e9fec44d6c8aa9158817d6599a15dc4d8329aac4bc9dad19
SHA512c4d3c326b530f2f8fbc2367fadd36a3960435c7b00113a211cd001f3d9f4ac08fc58e8f26063869c37f425abcc8a7e68343ed9b96a90471aaf72658555173b6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize9KB
MD5660750b2294434b8b1e9305b434c5532
SHA1be0c59b5fe4c4574f3112e445c1a03db1987a35f
SHA2566046e43a4d49404a2b4d4541de3dd230ece8512f872e6d1577eebe26d25446cd
SHA512f895b72d063673aca1965535ebc38265f475293b5831d8762542a6c31e44dfc9847461047f500787f95d7aecf4077d7589c548bb848e6dee7a9ba64f70af47ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe586aac.TMP
Filesize3KB
MD50d026103bcc1e4e3e3053e442d5f8657
SHA1dbe98fc2ec92ab1e101144338e48295591eb3e78
SHA256443e44a01ee1f2f4652c37f5ce277b80db7fe3b457a668b0afca03f801db0dfb
SHA512e6de03105a9663f731519f4610e22d0ddf18a727d1509e522fd836dbcea9fef3ce1761fc0495eca253fc2b969c93fc4676461d90d69c321c8a3812be18bb4572
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
8KB
MD5f51c55f23757bee849cf268161b9dc60
SHA164335d2e1edf72864bb886529a53bb748a75a282
SHA256d44009e231c0020b2598bd49a7ff6546299fafbcded35e5167cea99173f9dca8
SHA5120e1bc12e2354e1c0b8ccefcafbfbacf9ab60ae3308c9bd4fa62554d2c2b6ac106043568a6a7c4bd9ab63dd1fff5a2b7de6fd6cc9f2bdfed2337fd82cc6e64120
-
Filesize
8KB
MD5e5bdc40840364a4093e37c49ebc7762c
SHA12fae84ccacdafd9cf4f57355307dac4e32b0f83f
SHA25687f4dca2b35f1663bd31e8895400c1f79e1ff9a0d716f2ca99e5d3c6d75ccf12
SHA512b803faa514646f1ffa0547076fa3a7781c641723cd4ae32db6d817bdbf09914e5f044cd6d92cd35f3a3635ff7e0f14568b5d78ce90a849ff77f7a7694f21a5ea
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD538a2904e281a55af2a5c6332016b44a0
SHA18c63a01c4f0d5efe7ab314b6d9a0a59473787542
SHA256efe64e52b513f5df4166d3cb767b11eab2fca77392bafc4bbc3c982826a9b6dc
SHA5128882e756733b0fae827c788dbed257493e80fc204dfb609bc182ab58b33b2e7e5fe4f6354fe4f660ff34f1ec77bbc98dbd2ada86e7423363d71526ae19ec76ce
-
Filesize
16KB
MD586f73ba41d07635928b256afd65a86ff
SHA1c258ad8702a3127e2ff710897a94cd81225bfe10
SHA256156cf11e95d5b8a0a03c6c69ea23ce7447fb4c810497771ec68a52b0343e42d8
SHA512f00028f55e134dbd22d84e912e15a3a8ec7e8f554d89c8781ee1cf070264a2e18260a0832e78b7cabf302387a71c29d657b0481eacc2d974cd5e719c0a646f64
-
Filesize
17KB
MD56994ec14db92bf5474d23c6976c46c6e
SHA12e7079d20d83843516fd32bb033909a3f9df3a76
SHA2568c57263fd62a77121732ae9a85ecd44473f463adb4deb2f95a42748b0fef8113
SHA51224e3944eeece7695ad14bc4a368d79f7374006a32f52c1e65e671398db0a1ed040c00c679ec4220913a06c04657326ba161dfd359e388cde94447bff4e7f910c
-
Filesize
36KB
MD5ddd22498b6f05d12a85a09b261f9b504
SHA1a661c24478b2e74115e11bf83f8755142dbf05f5
SHA256aec5f187bc769a647c2863597a29ed98ca9a95721540568b9eb11e9d6ba0f4eb
SHA512fac69bf0e319a022f62272ff855be1e4a967189b6252ed444ebe15d23837601402cf2a48d00e7c1f827f54b4673b5471ff4e22239f68f1c86df17c32ba73bb3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5d9c47a29610ca23d0d30f1460e78e2eb
SHA151007ffd6b0c7553b60de7b3eaab7034e429c635
SHA2569d24258f08de883dfa14c51c870f4595e727632405516b7c914a96eca9b7fcec
SHA512279d86623c801ca46be5de56cf8cae8e5ed71a3355506b20492ea442c86db8591f83b7b8f97e4e7e865349060dce6378101d65b895fc9a9c9b0954f7e9bba287
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f721.TMP
Filesize72B
MD5f0e32fdddde6c594703308b0eaeb62d9
SHA1b891eff813aa51e4682e2d840d28eb4fe175ac06
SHA25623a3a30dae703a339ea6229cd8e4c25350d8ec061108a4a0ce8d1f7753120792
SHA51220675db12a39e4a7bf5d7b40b05add49bceb6d406c1b82805ae0ef9d59b39321ad12c198fc4095eebf31115056268b5ac34112019da7c7e9405dc826a5ffa58d
-
Filesize
22KB
MD5f34e83162373ac6416d0bd47ba76036e
SHA1c449a7b4f555b815800c24ec0d5fdde0122c3f22
SHA25605f6874e70db6b37df0e2e1b90c0df15d36479e6072a2f5c3e3b1be204d1b9a9
SHA5122cba463c5a20c168af3bef9ea480dda8340b1df8955163582d0791d2f3ec9ab05af0d605faeb433c1a25e4b0062bf3f0da9d7b7d0dfd44409fe8103df4b654be
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
18KB
MD51b59098cba469e1f5de937ddf57679bf
SHA17271408acd0ffb082d940409f74eb08c3bb06af3
SHA256ea1a71ebc861aa5a009128ec3fa8e5a1d97236ef272795e494d5e4ffa7abe6ee
SHA512b91ec9c5242e654bbb5bf5cf39d0212c11c7e3282fa64adac1b4a1c1dfe81101106c8a0a1af4d45c2e600b51a519fa41d677217c42789357ac5fac049d324a43
-
Filesize
904B
MD529e39d41ce346720d2fa0e2a30f3cc19
SHA14011abc911d1e5847cdfe81fa4063342a411129b
SHA25625c3095f4a43b0de6ab89a45662e63bec491ee7084f0070a98e9c2d041e6e9ec
SHA512c2474c0e8676d6c31763698bac03722d52a667af8e9a4f86d05d3b6b954c2db92cc6107cd8cfa09bfd6725d5883afa7ce1c9fc6a0539ada9006addd497848ac3
-
Filesize
469B
MD521f827d29fd5ee974847e133b4aa1403
SHA1daccf97419a6fc3bf020b0efd073daa7de336b6b
SHA256e45de8573ac4e4adeb3d43bc8c82893503aa51a00e2536d7d46fb42a3cc7f5c8
SHA512c30bc0d1d77b6d249514f1a1fc9c7025071da61291abe7cb59d4fbda6bf5e4f52a86bbf1bcc1ee6a49d316123ac8df6980522b62d728d221b78c89bf7ebe96bc
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD5ba49586aee4b407f1c764829bcec0cda
SHA11e89b6b6ba9532edf2efd5e077fa3ccad3f57e4a
SHA256d804e4052529a004019d3ec729840e500dc9d7930437483003c78c6a4c653028
SHA512d05f65402021ff778ff35d6fab4fc319bd27644ddd04449f193ae48c7deee946904c88c34e460460536432bd185efc91c4cc6e112f9e1b25160cb819e6f09012
-
Filesize
41KB
MD55ab6f0f29b366e37cd6291b6f79e7198
SHA1033793f2d92b91d4c7d49aea8dec68c4382b94b2
SHA256462ca5096c6a9c023f4beca76ff537b38b559a6af881d75d1765d945e83a84b2
SHA512119befb3ccb7813a6a670c73088f23b7058d5fa0e56cc90e15db1ab693d3f2c3fb7abacb603efc624d6acbfda3c0cef7918071bed374ff9818096b252b06bb17
-
Filesize
50KB
MD5e852f439d5e97e176f6d9839ffe13f40
SHA197b4162271de9786e00b20062111b5b3bf755f53
SHA25678c1c0961c833d585ecb597b9d619ffec1e9e51b73dd531c62f458bd6c2fbc98
SHA512236c8532d9d1e173eae3423a2da334737bee9645647e32ed7026eef15b2a4541a120610167a9ad9af3e1b91e54972fe7f2c66fbf07a39b6eb446576c117688ca
-
Filesize
392B
MD558897a0b5829d0aab35f43f921e6ac0c
SHA1476903b886260bb159bd39a661938f7ee4993822
SHA2563eca5b12b78a5846c38edea729dd2bb232e9f07ec0d74e14ccaa39b98bb7f142
SHA512f62a5ee49d5b66d4ef6a6b37cf8333d2774d8b04d7b748c580335abbd19d8e9e3c55c6d84ebe625726f9d610c738a5957826f0216a506c6550c58ed454642381
-
Filesize
392B
MD5fcaae6bf368a3088f8ae4407da9c3c4e
SHA1d677055f093e34da65c987976e97567c9c5b6e06
SHA256243a566fcf1c37069a005db4bab7cbf1a18330d9d57fb948441d8b33092a9c4e
SHA512c1e03e6462f81224884773eff51efa4b9128ff48c7decdbd9be84f7d999111fa71b1d81405f4434b523a2f2b2c3f9afabf73d677b100bd59e781844005cd139e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.19.1\typosquatting_list.pb
Filesize638KB
MD5ca87451145b7744bee71724af1feca21
SHA13d99f1ad97326e49ef04904db63c312bd8c64612
SHA256d03de614aecf8590e013746de46b715605b72445a14702edbda12b5ce2db3df3
SHA512ef4a47b30b6b03bc73e4c876111af6d08f741998308bde635427d466d4800f8764ea94462f4bd9f13d21c9eff12cc3c2b8ac13433a8cef3f7aa5bc8395c4285f
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD53909dc1bde5addb7b21198f69b6c40d0
SHA12bcfc8ebde45f5cf98c2d397eda4e1f31dab7c89
SHA25602fd366d5ce1dac9e0a114404fa93d0fa624ff28ea800d83081b8c56ce646078
SHA5129cd9ef4a755043b8be83998c52f828804796a69c41ed2a8d0b03d4187a8b85ef85ebaa60caefc45170374491a3de207bae7d8b49b569251d96d98346467a97af