Resubmissions
21/03/2025, 14:48
250321-r6qeta1tbv 320/03/2025, 15:19
250320-sqmjnaylt4 126/01/2025, 03:00
250126-dhbd4a1mak 3Analysis
-
max time kernel
45s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Noktox.com
Resource
win10v2004-20250314-en
General
-
Target
http://Noktox.com
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133870421479696275" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{40F9C163-8D6C-4B50-8E32-A2F8EE579A70} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 4232 3532 msedge.exe 87 PID 3532 wrote to memory of 4232 3532 msedge.exe 87 PID 3532 wrote to memory of 3616 3532 msedge.exe 88 PID 3532 wrote to memory of 3616 3532 msedge.exe 88 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 4984 3532 msedge.exe 89 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90 PID 3532 wrote to memory of 344 3532 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://Noktox.com1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b0,0x7ffc0790f208,0x7ffc0790f214,0x7ffc0790f2202⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1780,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:32⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2220,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2204,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3480,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4196,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4244,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5236,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5208,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5504,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5172,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5712,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3780,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=3792 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3780,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=3792 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6316,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6304,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6492,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6516,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6576,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6524 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6580,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6692 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6820,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6860,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6872 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6924,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=6936 /prefetch:82⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6296,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=4476 /prefetch:82⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5420,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3740,i,68046096763011912,12703302501044626121,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:82⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5cba1a972cad15b6b7d1a4eca3537bfcd
SHA17d234185ce6cff7d743acddc567bdca533c4327d
SHA2568a656e21fdf110c99b16210e30eec6febbed05e8a7aaafb8c4463ed72c55db54
SHA5121d300b31f0a56db453f6c8054284175726ae344777e023b287ee716cd9a995c595b07472c5b8b0c0c5a972e6f6f998a655fdfbb9c4238678580e57bb47f6383a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57d66a.TMP
Filesize3KB
MD5cf4ae32a6142709b340d287eb1039a61
SHA191ba2ba2dc9757fdb2e90dd38aef92a89efb9efa
SHA256509e92eaf991ac6f07f603ab53df6b5873785218d0451c1068cc391f48e0ddf0
SHA512d2866ce166049937a2709767938377905d5bc0c6d192afaec50142f25f1d7e576e0ecc51c98448b3fad2ed71cf2741571ae71151ff733579f35cc512ae6e4b35
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\89701c4d-1616-47f9-99eb-b389e6a51a73.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
14KB
MD54c8c04dd25f2764ad83c991c088d1483
SHA1d1539372fab41c54d1c42956951327fd0c37e17d
SHA2566bba789d723f7cf432113c5507fbe72c0ff0cc517e17998f4af91b8b27dc5d9a
SHA512f6717ada0d58714d71877f7d1f747b47656f4191bf36f12d0efffd96f9948afb02d9fa24df556ecf9bb739acb57730fb22caa1ea3251ddb39e3e56d6e3bff55d
-
Filesize
14KB
MD50d312035bcf940efb0344773769fe8d9
SHA1a21ece5593c1d212d5b332722f5c89b6250ac2a0
SHA256a85deea4f66be1eed2119eae1db5ecbbc1e1e0ea42f647fdacedc90af9646770
SHA512d417bb6e742bbe2e3f352a97556963ca77b1c18e8c27caa92dc223e6f09cc3c92a99970faadd510773681f0b67cc7dd7b70bfd553c4abef205687ed205e437ec
-
Filesize
36KB
MD5e838bd6cc9e3700ce6c02439498a845b
SHA1a3ae6fe9b6fb32d47a3ff78655e556ac891aac0c
SHA2566029236628aefbbbba1985469d5b9cc43335f0b0649b2ac86ebe6168353931ea
SHA5129a4d7a23064154d62b62f75cc1878d37d465880cc4bef70b96751e8fa4878f82fd0fc6d7eb0904715cf61804a3c6ae81d70f45f23a6691950c4271f0fa75441b
-
Filesize
6KB
MD56d034f61ce480abab0b5053a43cfd068
SHA15e0ea89b9a4353c2dc25806c7c814a56680ed793
SHA2567df7a8968bad79da380c9b6fb9d8e7a5bd74dee25fb6bce8f2c5ebd75b097926
SHA5122ec7c36126f302083d34d2626757c7aa1aefc81429c1b25a6719a8ff30b5bf16e1c05e761a67c1a4fef77e353b4097d306fd4094aa0a8bfc57f66dc9b7e3639a
-
Filesize
7KB
MD503c95452b8f9d8a5d5e8355428456d02
SHA1f9d901dc932a9ce14a3b785156956d052ff014f9
SHA256410b807cf15e890077e9fd0c09cd146e585f010fdeac3269154ec86b95143489
SHA512d1967c3e2dd19e541aac0bdb472208a81d852bcd5da5122c18da0cc74ca2f6b7f0aab069351924397546bbcd90caf92ecf1b10a5209e797cd1df9d4393ab8d00
-
Filesize
30KB
MD5c858b9d367fa9cb9db7d9cdcdc567d2f
SHA1065274d2be07ec68494f9856aa193c3b8de52aec
SHA2563cd98ad86e421c9134e487cb0d82bf269ee698a7a8152a234fb2564bbeb8030e
SHA512632092350f6cb05de7bc80400f5b5f5971cdbfb1a4683b445f78a4a861f7e8dd76042b5b5241e8c791c146ab53140de6065072837d9187f7694e3efd66f65f4f
-
Filesize
30KB
MD57d1f3b3061a11d3e6ec44b13da52533a
SHA131256e038bc2a879ac3235f3df607b4b459560f0
SHA256f20cbfcbde47eeb44200b1b5d136cf9abad2adedc94cd1b25f8c874a6c5048e4
SHA5129f6e936166a01a033d4831099fc0b8cc07cba7c05c6f6525b68999aa57aa56ac96db16283d52d85ea85517531dfc07f89580202b6ec07ad7ee02afdf6adccbd7
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD587cca886d397bdaaa79bfe8b2f906e64
SHA1674bb1e6fed9d350df0c73c3951744b846d71548
SHA256551f5e1b890dd9b3c2f0a1a02a61fd3e214e01c1f553d01e4d557bf764eeb521
SHA5122e0bdbe61f97cf4e9a517e149812774ff411a3bd1b0e0c8d653d9224169f36b042402e42359feec86eeec69f1981221d7d5ada42e51b0e2b3c4de8ab414c0ad1
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3532_1963866305\1678ba6e-91fa-4470-bb02-14ce4ced8465.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de