Analysis
-
max time kernel
41s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 10:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.financerts.com/nam/282a3295-5c42-4d93-9ec1-6631001cc5f7/e065dc5e-ae64-4224-ba40-24065f0da1c6/2aef5d53-50b7-481f-b139-96436686ba13/landing?id=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
Resource
win10v2004-20250314-en
General
-
Target
https://www.financerts.com/nam/282a3295-5c42-4d93-9ec1-6631001cc5f7/e065dc5e-ae64-4224-ba40-24065f0da1c6/2aef5d53-50b7-481f-b139-96436686ba13/landing?id=OU1KeGJ2RVdqdHFDWmRJZzZ2OVRpZWlyNkFVRUZmMGZYYkczY001QUdEbzROQk5uVEE0QWVRV09wZ3RySE51QmtQUTAwa2ZuWnpaTW5NYzUrY2M4NmNoaU5jZHJ1RlBVc3BRQXp3bklJUVJwU2J4WURCZ2hvSGFSY04ybUJHV2ZHQTJLM0VIUitlazhJL2pocWdiSE1RRElxQVZSMTYwalRDb3Z5cExYWVkvSmliWWZ1cmJhRXBYQWt3dVkvMjZtb014SktYekNtUGFRRlIxaENXYnA4cXdVMStSOC9OVktYTlBUTVhsR2lyVWZrZ3ByLzl3Y1pESldyZFJOWU1jb3pzU09ielVtTjJ0US9hdk9HWmVXa29CQnRFVUFRZjNiTmFBR1Z4VEkwQWNDR1dpd1JYVkpzdXFkSkloMjlHdWFvZURsUTlnUjRYeWlBU2ltYW1vNHd3SXZtSXArTExFVVBRR2VlZ2d0VTZmYTQ5YTU5d0FnZkdyczNFSnBOZUR0dmYzbEF4aWM4ZG1Ja0ZjdDNZeGtXUEUzSkhVK205NTdaVDlyUnZSK1VnQjh2TG53RE9QTkFoMkdsYTAwQjFQMg
Malware Config
Signatures
-
Detected microsoft outlook phishing page 1 IoCs
flow pid Process 70 2448 msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873729572564437" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{38C6FE30-4D44-4C94-9DE9-6023800E6B11} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4888 4972 msedge.exe 87 PID 4972 wrote to memory of 4888 4972 msedge.exe 87 PID 4972 wrote to memory of 2448 4972 msedge.exe 88 PID 4972 wrote to memory of 2448 4972 msedge.exe 88 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 3520 4972 msedge.exe 89 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90 PID 4972 wrote to memory of 1324 4972 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.financerts.com/nam/282a3295-5c42-4d93-9ec1-6631001cc5f7/e065dc5e-ae64-4224-ba40-24065f0da1c6/2aef5d53-50b7-481f-b139-96436686ba13/landing?id=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⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ffa5a31f208,0x7ffa5a31f214,0x7ffa5a31f2202⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1956,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Detected microsoft outlook phishing page
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2280,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2340,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3528,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3536,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4376,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4268,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:22⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3716,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=3688 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5344,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5260,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:82⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5212,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=3700 /prefetch:82⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5912,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5912,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6136,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6292,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6308,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6564 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6360,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6700 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6312,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6832 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6336,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7036,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4388,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3524,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=6520 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,14332440214275477379,13224546371436798279,262144 --variations-seed-version --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5ced4c0c1075b453e16f8ee8a0f0a8dac
SHA1e8def2fe165c7b07df9d3d57caf6c2bfd9280c7b
SHA256f88d5fd92b9c6713352ec7a85e8d30d61702f862f39744c6b7508b5b9891faf6
SHA5125d7bb4958a3fb359c8755868e0d4bfa6d2e963b29979757f244c1a741a43d60b5ad75a9cfe599633f35ab3797efab010d1261d7fedf3231dfe1f5994553c6854
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5b9d56.TMP
Filesize3KB
MD5fa2c8dba9410aedde3a8db19c772e43e
SHA12fd7415f4522aa63f90d776413344bb77e2e380c
SHA256de08133a8d885ec23116e0c911fdbd1ecec5bbd4c88b4ad20ee0d8e80a74f958
SHA51251c2c1d3f124577c1dd93e542d4e545d285e8f7f68a34aca50a65c044788e2c7d672285dd2f5b11555f887d4c24d433070c5dbab1f8c992756569e9a876e6672
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD5bc2f798e8f9778006254ec91d4711abc
SHA19f8e7d17d070d4a89270a080d667c70fd8fe974c
SHA2569ea7ea9baa3a38bc925d1e2f972bde39db03fe13815c87ecfd4495dbf14c1f84
SHA512caea33fdf7cb724a2ccb90945fe1aee70d1a43b9f2cb23e16a552730bf70e49c57b087ddcbbccff1ede543b0f853da04f85816f94fe2832d34939fc7f6a464fb
-
Filesize
36KB
MD5b525decc925312b9792ab235af3f7041
SHA1095c2c25f7bbb69974b7b0b69a8752dd0870265f
SHA256be0413147f02fb283ae315d6bb0bb49f120018d7c4f2bb67e35416c3ea4189bc
SHA512850448c5dc7fa8e46a98418e7e24bcc4a0203957835671d8138c6a0611358b9a50dd63e1d314f371b3cb13bd0e1acb40eca2637f8108346646ff635921cb01e6
-
Filesize
4KB
MD535820f9751050de7c5ff62b62e88dd64
SHA15dd4d2e55e31d1316b709500ab04fa57e2db6156
SHA25612c6bea2528efaf032c115da1c55b882369f952d44c914b6354cc7a123a059b6
SHA51207ffedcf6cca43d6fbacd84469bb60e5d99fbb1f06477e5666f265aec5a2b4d1fc30e327a3eb934aa1781160e18a362aff36dac0e722c1b21fda2807aa77eb50
-
Filesize
6KB
MD51d8d11e51f6d9a5d2d4dea462ea62d36
SHA1b4033545e10a30001bcfd47534ef5ee5861738ce
SHA25672c12cddfd65d503fda526d2a5e84fff7e2f84d6f135522708e25ebaee8d3576
SHA512f60eb3ef7a507109ff342338fa7a3c2a76f6a1220445e9e4f7caa9bcab59482cbd057b19493f32b379ac21799f184019ed45bbd87b6b1daaa45990d8480bfae1
-
Filesize
7KB
MD5d2704ac1a8b75e342e7b42fc7c5182ff
SHA110d5f320556d646727e2e3eaa9c515f5576f8ac8
SHA2569622a8add89597f3da6152cf4b0d49d9400c8702e8b885e98b03bd0f24234470
SHA5121e8374d1cd383c580e4a64bbf33e1665290569c89c930a26b5c131ef2955f4c55e9a2e5da2197caa3d72403ad54ac45c047db3ceb727c5a96f0be8efc208aff3
-
Filesize
30KB
MD5d16c2190c7e0d17a03e089d72bfbf7a4
SHA1fec0fc605b387745d5d039c6c0800188d232f1f2
SHA2568af65da3f7c251ae7de79be292d331ecf1ffd05f00f46d4da70220cb8d6dcac3
SHA51256269af2178f2c3bfc777fa29ceb5e1e9e8a0d7ac11729d932d0610b29e1fc0d90256bf782b50e562e4ba8b70bc3fbcd80eed5dea9eeec5a65d06bd1129f6c28
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD562a0676336046483c33c4944786b8db4
SHA1197ad502cbe8410631211db7bdb205b728b8a31b
SHA2569efbd7d0df8f5f5b93b10a7adc7c53c019c7996f7ba495bef43cc869c1e6a27d
SHA51224ce9375f7d41d0fd2ffde5c77a61c530895100148ac9e1f34b760eaf0bd991f5d5f1693d937e1959b7015d805dd40ab0879b5d259fb8bbded796290f14c8e87
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de