Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 21:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vgmedia.in/wp-cache/4abf0.php#[email protected]&a
Resource
win10v2004-20250313-en
General
-
Target
https://vgmedia.in/wp-cache/4abf0.php#[email protected]&a
Malware Config
Signatures
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_1118673457\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_2100248059\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_630023810\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_2100248059\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_630023810\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_630023810\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_273001435\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_1118673457\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_2100248059\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_2100248059\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_630023810\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_273001435\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_1118673457\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_2100248059\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_630023810\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3924_273001435\data.txt msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133874126917588382" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{CE3C33E9-9B03-4CC3-AA18-58AEFB7931C2} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5936 msedge.exe 5936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2924 3924 msedge.exe 88 PID 3924 wrote to memory of 2924 3924 msedge.exe 88 PID 3924 wrote to memory of 4668 3924 msedge.exe 89 PID 3924 wrote to memory of 4668 3924 msedge.exe 89 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4632 3924 msedge.exe 90 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91 PID 3924 wrote to memory of 4704 3924 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://vgmedia.in/wp-cache/4abf0.php#[email protected]&a1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffb22d2f208,0x7ffb22d2f214,0x7ffb22d2f2202⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=2704 /prefetch:32⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2672,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=2668 /prefetch:22⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2296,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5028,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5176,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5316,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5324,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=3692,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6776,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6348,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6352,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5568,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6080,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=6436 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2104,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3828,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6088,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1036,i,17194121439380355243,12469576766024367907,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD53004ab7c9e3747e5109246e7f6b3859b
SHA1ac4c574c03611b8bc675e878a1be8124bc32fb48
SHA2561cb88f273e7906a853670161b6c75fabdd67f67c91b96a78171e2877b88eee96
SHA512f81e8de5d3010bce31b311de7545353b72a9befd01249cca99e870f141090ba66913991c458f4b5cdfb80902fd116fecd54981cc0a0f4049102247c273f905e0
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5ba7296f1aabbbb98bf5907de90c3a20f
SHA1dbad7fe91362df8029f54a0fac518fb4b6cc1e59
SHA25624ceaaac24ae6981b9d716015e6a874ce4d3b340f62d215e5566972f05c04bb3
SHA5121f05654ad08b586cbcd393faeb90760ff52c700194f8365b7a0970046b6a1d71ebfdfb108531349147e01838244ad2355167627bbf3558b6379a0a60eaabbcb9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58198e.TMP
Filesize3KB
MD587ba26e52059d17c3f84e9dae96d2e4a
SHA1f829d54e19f89b012c0f4f148133edb299965354
SHA25648a1aa88e1a40708cdbcd9d88eadcdba229301a73cf89bf2af8e5661913907ad
SHA512fd43e6d7adce18a8aa8c92ca79b317ae44a33e5112c7f983dce48a2f458d247c57196aaeaceaa604a4fe9e8145f4e6256a781fac46c6cb617a7d2b6c1ef5276d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
4KB
MD5933222cf96e6025ccbe735ff5a528007
SHA1355c00ad0dcc54a148885b7fdab1368cffb16b8f
SHA2563920abdd48814f8cc114a7da486166c29d707c3d37d208632e52ef1396e39b8e
SHA512f4df4b0bd365fda3e35b5d379c9bcd869ef57af4f46d46e17d91bb7b23b830a907a3f55a5619b195aa441937187d2ab9573dcf6ff24810eb6c55659b0a4d82e6
-
Filesize
3KB
MD575e1c7793653aad90e3157eddde6acdc
SHA1e1602bb0154c92fd6b336927264807847cb64b62
SHA256a32907344ee72501c07607a63d92a0ca1944acee4f2a1deee9fe81560578d2c8
SHA512a02f562e41f67dab1be8409efe203b5ff5e29e5e550af28886b2bfbc9c1f64b3cbaf28f0d669e22dbaa253acc52502242296266159bcab170c556dae80253eb1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD576e4bfd84eefcbddb2167af312d89b66
SHA1f22845fb89a950a94246f56662e2f43c449080d2
SHA256146a4a389bc99cc82013bbe9e775aba6256c631fa8e7ad202941bf5337a60c3a
SHA512fd7535e32c66b405c77c265f14f8dfd6834e7902f01ddd13991a60d1b57d9b0a12cef2556500b467e4dc477e893fb3aeff0ba491baa5d87a0a985761cf761caf
-
Filesize
17KB
MD534f697870a22e3bd7b8f4bc05e70c9a6
SHA12cc108a10768406c11eba0909c611c1c3e1bf0f1
SHA256a676acbaddc966f15d24410bf7e62b10269b52468c9d352e1becb90bab63f035
SHA51238082273009cdb34e6cc2607ac39c1300ec16098c081e9827ffe7f092c39c439b1ad72adac4369e1b15ba1f7e0ed7a1d1d38d37e0c3311f157509209a6af525f
-
Filesize
36KB
MD52dd49d17361ad2940917737b6eb7ce79
SHA1eacf52c2e4269f26db8591fbe02ba0dba0873c22
SHA256512369da209f40b84b9d68f3a0e694cc17ca023ad18316cd07c114352c08e3b6
SHA51270531af64bd26621a0e1c333f4c8a9ad9f2d7701fd8caebb8423cbb22eda8c1d19bdb8f0408cacd7fdc7b7f6701c1096b0b94720242aa90b535655c5c784c638
-
Filesize
22KB
MD53c9df51c20c881377e8b3252c9d46e4f
SHA11963ae482963034ee7a88338da3c3118621637ea
SHA25614534f5c6bd07136ac7cc09024e1762c69456394e3442ebe7e3a1fe0f332d3a9
SHA512dce189af2035c77b1a720f58b0068b2ef5c5dcd6f8dd003af663bb5c6d6ec56003d24359d27c1916b54f79280b8eb6ef61b79a33b7055dcc4a8afc525e851630
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\50c540d0-4d3e-424e-b281-1766a3e5e530.tmp
Filesize469B
MD5b9a4fe19bddec83ae411efb71bc93ee0
SHA157217911d1bf29b970197eb7fa4dfea2247e10c2
SHA25614aca24ca3a4866becd6deeca693944554b1820b9b768bd7acae59f9bcb681da
SHA51222551789736022492a899cbe49810a13a8724e29718a4e0605aee558313ea4a4bfab2c66530698d50ede10e6911647ec2c1b153795c0d9d465d9cd31793b1d4e
-
Filesize
23KB
MD5b700c564bf17cd40beabfd287434567e
SHA1c94644bce9b8493257b88c5d86f00f56ece08e35
SHA256103947b1e67b8073a10dbfbd9a8f1ee2571ae5eb8f214eb9883795615574ae89
SHA51227c7b5c6fef9d17cd406047bdd8fd5dbe964cce46e722bd5058bd261fe85c961f9315b99a9bc4dfa50bb91742cdb0b72e2ee47e139bacc095e1d6061f1778f9a
-
Filesize
904B
MD59e9bcc42ae182179e3e8546dddab2af0
SHA1abe5ed4300ef9815017a4dbe192e7ba85a9021c8
SHA2568810c0ed458651f0e2b73d654c8ce468dec08f5906f9d1a50904ae721d50a43a
SHA51238ac2267020aa687e619b6e7f6150d2add8d136536e0aee14417a3a94d087da8dcee369d3a550c39003958dd00a88bec4e1ebc257cc471a56c9c605aa8505b1f
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD5249585b52323d6d1b26c6d86e7726329
SHA16452f36de80943c8627e192762532eb4c5048b41
SHA256de986ceb6af0362c4a582ec5c93ddf81c36494fe6dd62ddfde039ae9a4944f01
SHA512751b2270fd40ebaeb1f05922bd7867abd299b89be94d642237f8e961aca1ec933303d1cab4a2a6310410ff466653e736ff41d20860787b76bef15be0584b0e5e
-
Filesize
49KB
MD52ff2c06a6df863f72021126171805e3d
SHA119cb86cffcdaf55ae84be4d49f50a7e7641fd71d
SHA256bae494176466c484e46cccef15bf03e6304d1076b1b87a42654af67a41160ff1
SHA51201a9393b3e520dfa940fbc2e3a39e8e2aeb6158fe1705ebadd0bd4371eb430d84cb9e130448f3f78707d5eb54a3ab3e8300cc883f9ad015ee1d0acd7f12f11dc
-
Filesize
54KB
MD504d1331e25184c63c468c8ee0381411e
SHA14829e89f0784fb65e1ab9645eb14d0989728128f
SHA256e52b2b8cf9a1a58ccbd9c7b5d8bb57e88b0191cd241130ad1a6da77d82e0a23c
SHA5123dbb3d1dd7517e9f6da357e44546f3ccefc0aaf582c0b223985a87aec9fff591afc950002a724214b692cc9ee51296dda8d9cfcafc046ae1f99fa0180044cc88
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.25.1\typosquatting_list.pb
Filesize628KB
MD5c26015b2460d1acf6859aad730dc8f4a
SHA19c772753b62eaf995e39ea5ce1ef86454b58f169
SHA2565d816db5713aa5d2fa0c1de5461729250439d7609d95bd65623c0ea62da192c7
SHA512ef72f6e7a4ac1eab4c59ef0d90f884e29880a305ca262869b87a90462897d182a45b38fb074d704205a422cb886214c05aea6d0701715917b3092cb15559a6d2
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5a4dad8aafc8d25b2edc85bb3081c31f7
SHA1a3a4face5777c44c66307fe21f61ca545b413378
SHA25649fabc4b2c2c90b3897380572b3c30426e277f4e79f1e0c42c8b9b51e27b7744
SHA512bf6514c92ed162bcdb7521718a8ba7b35a14824d3d51b653c05dfb4fda27dead53511691ab43c097307dfcf1a89a89c5c80980282700b9590f3fe3bb2fc87d4d