Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
25/03/2025, 12:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.microsoft.com/fwlink/?linkid=2122659
Resource
win10ltsc2021-20250314-en
General
-
Target
https://go.microsoft.com/fwlink/?linkid=2122659
Malware Config
Signatures
-
Detected microsoft outlook phishing page 1 IoCs
flow pid Process 29 2348 msedge.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1649712170\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_946053060\keys.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1691013018\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1649712170\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_946053060\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1691013018\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1551934973\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1551934973\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1649712170\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_946053060\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_946053060\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1649712170\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1649712170\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_946053060\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1691013018\data.txt msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1408_1551934973\manifest.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873811540902557" msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-73851796-4078923053-1419757224-1000\{C8749BF8-8177-4047-9C4D-34C5B89B3D44} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 448 1408 msedge.exe 82 PID 1408 wrote to memory of 448 1408 msedge.exe 82 PID 1408 wrote to memory of 2348 1408 msedge.exe 83 PID 1408 wrote to memory of 2348 1408 msedge.exe 83 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5848 1408 msedge.exe 84 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85 PID 1408 wrote to memory of 5824 1408 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://go.microsoft.com/fwlink/?linkid=21226591⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x2d0,0x7ffa97b8f208,0x7ffa97b8f214,0x7ffa97b8f2202⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1888,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Detected microsoft outlook phishing page
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2184,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2596,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3496,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5056,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5272,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4824,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5608,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5964,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6424,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6424,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6020,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5128,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5068,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5260,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5992,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2848,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5716,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6104,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3388,i,17553341398314553745,1454759399725104836,262144 --variations-seed-version --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5aad9ef568b38aa2ab42b57a3cbd8d8eb
SHA1efe601b188069ca6b54ba6bd63866687c5574780
SHA256ef0ca3af55b0eb83ea83d3376038feecaef97236df7c556f821c93bd08e86a9a
SHA5125a3e66a1f995ed2779c7260787a2688118406190312d31e7a77bbfef233d81bbc17dd1bbf77a08ba73e390e22dd973c173b5eb39851b359a9196f48bb6fea963
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5d59774b15243ad850f63e30c11f9aa18
SHA11fa5e9b71243a5f1eca01613c90a363e3b568093
SHA256d3bfdd4caa807774f01b9a71ece3533e5860df091672b0982b6724e025305669
SHA512a63e1948cddd35ed9ac999be14a37d2e562bf458cebf57c841c27fd95e1cd3d3cbfc44f2c6fc0e8eeb65955f19695ca248e88c86e77fbba5f3d26dbbe2080ce9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57d90a.TMP
Filesize3KB
MD539e045b3527cd33df78a19718aeea394
SHA1ebb0a4f75b0307f13e9745f276dec541b31002e3
SHA25646746529ca49941ad77f6c1b03085e5b8950d0889bf58bccc0ac4169c57e63e3
SHA5128bea769518dcd6d2777d236de769d50ac61ec6143bdabad8f43001ee69f5168c5402d15b8028b45b1cd0b154852009a84254c32eee09c23eff1845c084c53f26
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD5816fb5079eedeca671cd9cab04334d5a
SHA1a2d0ed0fcffb1fc355434d93b8d756978986030c
SHA2563257f34b41b2dd7c3366b50934ad810a856e20e8d2eb18f774239cc61e63999f
SHA5120d3e9bec69abf11d90b72159b4c3d962c6a09ba2d68436a7d94f828db4a1bf667cdecdea2868c850a858d0adef01d2ec540b7e61f6b719f2abce0fa3aaf9c903
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5af3c52d5e083f09ac3bf7c92c3a0555c
SHA104df4d08b5a64a7c3937f7a5cfe22b9210c03ceb
SHA256c0f2ac52c9657e36787c56fa977332dd7dce212f0228090d5f75c6b2ec7e3b9f
SHA51212db2d7ebdc0dfea2ec0d2780c553e4b0fc430ff5db5b3c2fa62d9c01bc00afca220e5971ef5099804ab357edeb69e40f530327c14744c887e4efb58eb17525b
-
Filesize
17KB
MD500fe82b2b5d97303ed1d1e8b484d379c
SHA1baaacfd1d9646664aa9f6ccd19be7870a15f4f9f
SHA256d1a4ac67a08281bc20f50fdbc6c479b37836067a50f48eeed15cd4845771a747
SHA512260efd5042fc6ab8a15aa9d555e2938f19795e0c288a7475b69213a35bfadef2ada2c20faf020540e631749d698f42faed25553e875128e92d90834dc9a77ea2
-
Filesize
36KB
MD5af66868133a003fe7bca7121ff150e04
SHA1b42f8240b052ca492169a96b64f4eb922b6bc3eb
SHA256544c46f907972ee40096768f4200167a3441b980323c840399bac5802bfbe5e9
SHA512afc115ef22432e02b863a21b5b39ee1403e8eb4cff0ebc55c39cc75265e2dcd81e47a59ec317d6c7b8563a73fcb30ce28c79846f63925a860ecac1ba6b9a3a05
-
Filesize
22KB
MD580d32750f27201de83260fbea01a11ab
SHA1104da86034b28cdf0e2777cd5202bf57a58d14de
SHA256ea66f5e17f1e138fb1f9c49f8a8485fd6d2d7f3a532e8c6f3bba07942c3fa480
SHA512bb4619bad1edf65b128b43ffa822b7c4eeb02350838b3465e8ba896bed52c16580197493f188098dd546f549643f121b55d8eb2df950bd3f6570a48917376436
-
Filesize
23KB
MD5fbd044b01eaa95991cc37614cf00f993
SHA147c6fbf7552d1d53a1cea813c72d27c0c25c7b20
SHA256bb0bbbc9c75ff370dc48c8d6498894812d443b44f473da19d167d53e492795c1
SHA512d445eb7680387da7cf9821558ac7739a396b97755f5d9c4315198cf1bc98338fe849fc49e05c837e9e34b7826545ef3aa9d2bfd0b83a20b9971798e45b74a3ed
-
Filesize
467B
MD5d7a037c9064f675a20daf52da7e52b8b
SHA13a1fd1b36b87412a40dc254bc1c70cd9841826a0
SHA2566ff3ad83e169e17be1ccf42b2cbb6fc6ca906573aa753418ce5b46d44bfbc565
SHA512c780a613af15306c1cddfa5f7f17227ddf5ad3fb54a4699a84af895f3149726c3d3ab39c99021a68af85016c83d1e9ca09fa72a7d05897fb1b0a55734288053d
-
Filesize
900B
MD51b2ef68417ed31f262d6393a9d7a79e3
SHA14043808138ea2228485cc6e552acc80535fdf3ff
SHA256d93def99a5963b0c4f4aaec2bb8735a0c7857be886eb87e9f87d17fb3915ae13
SHA512b15f611bf64cbb96c834d7c6eb262989826bd5c3e7dd3b836478e0045166ffa8570332ef00c7b9fdac7d936b1f9e56cd894fe5ecf76fd81c45dbf7d284b416ba
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD5d418de303f4fffa253cef15f81190c9c
SHA1d0cdf3d24a8c093919a1f999f1708f358f117fb2
SHA256b7b549d0857a71069bfd7756ac7383933889878519953e2c72dc3d379f140f63
SHA5120d15a243bdb9eb02f299501d491404f49812f05a1234097b27d613b26c1a8194aae48eb144cfe1f2bee9af1b1729a0aed7eee44862832040e5a303582e19cf4b
-
Filesize
49KB
MD52627716667bf680a83f4c37c4ee6a0c4
SHA182831bf6ed91150d815511ff07641c2af3315215
SHA2561ae70ab2cc1855067cb379e0919f2d1d790d8cff76bf51064c0c4951acc94fc9
SHA512aa4b8d5715122d116868e6d1941511b52f2eeb5c67bce0bae55e34a2e70ea39d5ff84fd7b50034b71526f9eaa0f2349eaa72f597622a83bcf64b0487acc07a10
-
Filesize
54KB
MD53b0cda05a35e17438720e96451f42709
SHA158d89a81be1bd5a65174894b26a75a211263b98e
SHA256d3983b1ea82a4a73b33e82e2e8764ab9fd9235fe63848039f554b53513fd73b4
SHA512ddd80b30d1af37ffbc4c9560c20aee70e196d482ed38aabfab1178894bca479146a94126b3788023409a6d1ebde86b1a4e98b85154c09f95d4c70b7e9096b63b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5d0fcadd7df408e8b3d11c194f0e52dca
SHA124149a5bbfdc7a126158aa34b9c71589a6bc9331
SHA256d29d08112748cf95030b164a4fac2341c48c4c9be496db438fc85c224def0360
SHA5125f322ca62b2114ee0d6c357be9dd420188116e870e5770c586e6774e2adafd0fa159d0a70113ed68e46a61260ad159386432cfb75defde76fcd6fb5415c5cb1b
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c