Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 07:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://draugiem.lv/say/click.php?url=///itemsidguest.com
Resource
win10v2004-20250314-en
General
-
Target
https://draugiem.lv/say/click.php?url=///itemsidguest.com
Malware Config
Signatures
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_1935483530\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_1480031314\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_1480031314\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_264009469\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_73690920\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_482440186\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_264009469\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_264009469\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_73690920\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_73690920\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_482440186\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_1480031314\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_73690920\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_482440186\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_482440186\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_482440186\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3404_1935483530\manifest.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133871874221670409" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{9BC237A1-F8AA-43AD-B465-A1F0C6BA6E97} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3456 3404 msedge.exe 86 PID 3404 wrote to memory of 3456 3404 msedge.exe 86 PID 3404 wrote to memory of 2492 3404 msedge.exe 87 PID 3404 wrote to memory of 2492 3404 msedge.exe 87 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 2928 3404 msedge.exe 88 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89 PID 3404 wrote to memory of 4800 3404 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://draugiem.lv/say/click.php?url=///itemsidguest.com1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff976d9f208,0x7ff976d9f214,0x7ff976d9f2202⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1812,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:32⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2268,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2636,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3580,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3588,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4180,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4284,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:22⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5312,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5488,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5520,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3592,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:82⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5292,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5944,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5944,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6304,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6352,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6344 /prefetch:82⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6212,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=3840 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6208,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5408,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6196,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6724 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6876,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6864,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6740 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4324,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3612,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4420,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7052,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5536,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6420,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=764 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2024,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1048,i,18394317230479822904,10239602899910304510,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:82⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD502e82be019053939bad3f8885695141a
SHA105db68cf6a4fe5b75c7c5fa80039bc0f30088631
SHA2566e8bc8050a36755abf86b263f195e3eb5e6cf8a47d0e7311d0c1546a443685b4
SHA512140761829fecd08dbbb151b99891bea51dcc2d25bbcdec52e029a9dcdcf0ac0c93e46d1bef62922b10a5e2474ef4843cec0f9fcb8ea8d2f557998a74842fd2d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57f3e5.TMP
Filesize3KB
MD56cbc378966adea5f247763201a2928ca
SHA1a2eb0505d0a65bf8966297658401dab604080ad5
SHA256ffb608b039f3aab88731ba9ab1fb46e524a44d2629648c81ebfad04a129d2420
SHA512f68731e65e850de963df0515ae3462894c265bc0ed2fd161eb00f0b9f9ab44fc03063949388db21d3f57bf03474bf95d20e065b4db71da17071594dc12ec31e0
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
4KB
MD5d0b42be734ca786a0845885b05b7c222
SHA1db75aa0244673bdaf5575f17c333e219526b0681
SHA25672f64b00ac38c158bd5833297af2b43efd668a48dcf816e2e3ec127c753401a9
SHA512267a496b161b299e224f2cb681a6953fcb2317e7b5b168e7f63a79bc05ac330f3e8167dc9cae29fa8edef0ba0d6d28e0c1722e0fa6d84ada1dd26c810c033142
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
15KB
MD5238def3f202895bb905230f679a5c9c8
SHA1acac347427032398a8ed6b3de91a588047bd0419
SHA256f44063dd6f717d4f2ee3705c065a4fe11e0fd2056b0a8477e3c2aaf108fb5071
SHA512adeb43a2a3d334b8cb81ebe9c944ddf3255bb1e96bb08eaeaacf4d960b53dbb85ee1c45d02f6e9a0f7b2db1b4cb7a1e16e213d80935dd0aef441d6e397b16a2b
-
Filesize
15KB
MD590d6cc92439c785c742cd1c923c95ea1
SHA15c6e2d145a50c9c82c8daf046c7f8ec44f6f335d
SHA256bfdea518016e3985d2177a90a7ac8ab6de5ef8f2adaf4d166cd09af314386707
SHA5126f440c18856b64520b851f60d7f0032f2133c578c07b473e921488f984934ccebbeda3f0bb315abf17134a9630fadb085cdc31eade9eec56b757a08466533534
-
Filesize
36KB
MD551ea9ab0364e9942f7e4c8ff1bc23ece
SHA15b101c23c19ad880905dbbaf217ff2acf4500b32
SHA25643d3c476f3a67528a2803c5f75ec3cff0db8a5cfe9ac07773687603ce066fe4b
SHA5125f4c555d8dfe4bf8861bdbee5992e3cf477d87669047ccad03db6feb0e3d5556509e09a27f01f4676c5fe1f9e0b07d74c3dddd7108aa18904cee02c72762de8d
-
Filesize
4KB
MD5a19a9bcefdf2768f70845fb1c15b518f
SHA11d742c8495afbd989cd2fe2185d014b3f415e414
SHA2569bea0c870ca3d1bcdae17e7f37f7e572299388a28bfcd06e003eebaaa94d82e9
SHA51221c1cfcaffa2a0d0e75d22c5e264f736aaa13aae0c34347746f6584a0a8524a94bd8abe0ca46b0b290d2dbefed403383c8aabc7236d6250f8f0d8fd31c1a3963
-
Filesize
876B
MD5cc24203163596d052767cfb5d2545f1b
SHA1cdcc41474434bc23f1e7d8a6fa69b9ba288054be
SHA25654071cf62587852be1f79efa10cb3db6fde366bdb26ab7b4803cae7f461a6e97
SHA5126fdc54e4d06747df219041f8b0a04b5511c7f2ef4cd169178ace6bfff3b2841674a4cea61286bb03c17c84b7ee404cd598455eb5f8c590b9075c46ddb63a3237
-
Filesize
22KB
MD5bb39eeb915d8e008d5d514701bee103b
SHA12f0f47edf7267f6e65a0117bb913319b7e2c909e
SHA25642b87b82a5b058bcf392bdbe7c42dd8b971ed8c5b5c84691ddba211087becbfe
SHA5125fbc5411bad9feac8e7c62841c6818603552a9f571d7111850cd2302f7f5c5d319f6b3650190aa662d9ddcf71b2f28d570b94ada6559fcd3f055caecbc367c2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58677f.TMP
Filesize467B
MD59abf53a9840f88dc4f5e5fc09771aa1e
SHA1c52817fee7ac3a767b85efbcd40fb597700a6209
SHA2560bd519e7226a3b57820d60818777f672e341857d8269c02dfa248b48d4eec8e3
SHA512a3c0b442f40a6a35d3bd48abf631849ab46fc6785a5c0e8aa0f67e43fc20f5e9ef5deb187d72f3b9821daa8099fc40be4ac7b2805218a5aad8e788880bf8bb11
-
Filesize
21KB
MD5e4dfd0504387a1ebcc4a48846e44a23e
SHA1a5a91da421e3d8728ae857694dbeb24ea72b7866
SHA256d3c39babd9652bcdb02ae17f895437ed85f617cb04f7ba4bbaf7ad7e8ab78cb6
SHA51294a1d4ab7b18763b55c9246d73feb0ed64a7e506572884a2940696b12910d6ff2a03a0b1aca3e4035a81548633acd437e762e758952ba72dafc97f191e46d419
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe586879.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD51b18976a980b4f6ff3c67f0a716caae2
SHA1afd6ffa50fb4eb32d8a192b08044b0f64bae0d3b
SHA2568eb5ea869e7b1c527d933524ae6e843e354f45fcba301a84f03fd84824e2ac18
SHA512d09478b5b9ff1350d6df754db29ed86d6bc687a4dcf38d1315a56651939b6195bfeead71f7f69b7e019ebd15c314544fe7ad90864c1b8e0fd90dc6382a3ed69e
-
Filesize
6KB
MD54d828699c34ecbb6766c73b49f4d9898
SHA1c077635d28669f56cad81695c715cfe7fb95b5e0
SHA2562fc523fc965ac5f67405b8e5fcbef2d95500c84e16b2ac59cb778b504b521004
SHA5122c5ae1850aee3f5f6eaa5f0a9e5b7535ad2a2adcabb78f2fc2b945d8a04253d5377d90f1c9b3f6f883a1cf7a7270e557b1bccc46bce5a2916d9f4344f863ddda
-
Filesize
7KB
MD5cbd06483c753beb3b85f0a115e068f2e
SHA1d57db3a8fee6df0969285be02d7323e25a5b866a
SHA2566b2c1d310bc3c5f96c91d3cf14e85bcf6556e280e0357237c5b34c1d20dc3990
SHA5128f29ba854311b2e733206de588655a5af3f8052889c443e59442c23d40266883166f2c7d4f0d543de198232f61f0986fe8ad321d4f365ab4c551b842c93eb184
-
Filesize
39KB
MD5683d3607b98c556e0b9e371ed0021f37
SHA1c4062b58cca50d0a9fff0e3d0be7920af9852613
SHA256dd4953bae1e2b21543e5fc7ab507214fc2527e1d07bf31d6ed1827059a010c44
SHA512bafba3a1ece326308771b148e4ce00add8ee0e4a7978396b1252577a0b33c9b723375b0b3d762bdd4e2be8ece653b54ab2fc35c308290e81647835a380600716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5fc9ec640afb2eeed646a4645b5afad82
SHA19052a20a5cbd522615a2da18cf2f548ae31c74a3
SHA256238681f7eb0482f4c34754f0dd459437b5bfbb34d6feae724dbdde597d166070
SHA51250b9e6a39047ba24d995339c4bbad8f0cebb2880ab3ad4d9da5ea6de95a78ac4795ac739fd300cecc75011adf25f14e7f3899ae24c497157d110027dac26975d
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3404_1244673961\4599f1e3-98f7-40ed-bc5e-2208fe1c962a.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de