Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 13:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ne1.discoverconicalcrouton.shop/f38186770bffa4a12a7170942b9c0d71ac736142924da24a.xlt
Resource
win10v2004-20250314-en
General
-
Target
https://ne1.discoverconicalcrouton.shop/f38186770bffa4a12a7170942b9c0d71ac736142924da24a.xlt
Malware Config
Signatures
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_203335439\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_203335439\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_747302819\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_1266054571\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_1266054571\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_203335439\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_1605241132\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_96421374\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_96421374\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_1266054571\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_1266054571\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_203335439\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_1605241132\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_747302819\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_747302819\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_96421374\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2076_203335439\manifest.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133874676894771335" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-83325578-304917428-1200496059-1000\{5A02C5E8-4DC5-45E5-8534-282F3FEB15AA} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5612 msedge.exe 5612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 4756 2076 msedge.exe 86 PID 2076 wrote to memory of 4756 2076 msedge.exe 86 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 1784 2076 msedge.exe 87 PID 2076 wrote to memory of 1784 2076 msedge.exe 87 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3916 2076 msedge.exe 88 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89 PID 2076 wrote to memory of 3192 2076 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ne1.discoverconicalcrouton.shop/f38186770bffa4a12a7170942b9c0d71ac736142924da24a.xlt1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x258,0x7ff9d4e9f208,0x7ff9d4e9f214,0x7ff9d4e9f2202⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1908,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:32⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2220,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1404,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:82⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3536,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4220,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4244,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:22⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3668,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5360,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5092,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5760,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5760,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6132,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6188,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6500,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6576,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6572 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6744,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6756 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6904,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6916 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6892,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=7048 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4256,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4276,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3676,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=7056 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5484,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=3712 /prefetch:82⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5744,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6928 /prefetch:82⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6932,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6836 /prefetch:82⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5880,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=6312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,3855017703962612110,857282002906176610,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
105KB
MD5ed831478428f88826cc2e3c074f28689
SHA150b1a666dbd59972c3b793178de44d3bd96b4e6d
SHA256e45db6c346162b3d24c374fe388cd3c2ba252a75d539734a620c89c82e73ba3e
SHA512afeca5ba0faffaf9077ac7fc310ec676aef5a2ee9fc8987623cb98de41dbef520fc3f2a141673ba5ca63c671c2ed2e6a92cf873b5de607221c275669536924dd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD55a7e1750438748bd333b79a94ca69b2a
SHA194fd1be56969e269ce195ba29c3d464d356d6556
SHA2566d7a64a318c25c643323d5cf1c0c80ccf2f2433e7d74b722fca90468f8f9b914
SHA512842509c0f495ee24d152ab3f7867183d7cd64b01b5a9305405682abbbff3aa18a8ad7d97ee039393fdd1766fc17ad2df1caf711dc4db8dc7b9df608ffc0fdc7e
-
Filesize
280B
MD5eec55fe349980566b1dbf1d409d28c3e
SHA1654ce4b550defea0851f12e8ff81ae9298bb3f60
SHA2562e81ea3d7ddfc0274f3955d5131143c481e63f2529514c5295873b393d508efe
SHA51258e02658d08732b5f36e868331a483b5fde15475a6c5f704a19c97d920399c3f7d41a8fa163c66683bf403598f8f48f0cf9fa468f9783fcabd9136a55cec0059
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD50d19640340252429fb51f50c80fb62e1
SHA10e5471a5837899033c8f9cadd8d84223eeb5f3ef
SHA256e430388765987faa9aff0d5955454585bea57237adabf956590da33b1a7de88b
SHA51248eb5f4744d0f230a4477b8ce1d1b2e82652f07dbe0198f48095638530d41d6af60ebcd129602e64a7573734e6fb8f43d13424f76c1439039c04ff06420e4ade
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57dd50.TMP
Filesize3KB
MD5b23b12f7e566ed3129c215914472e727
SHA1cb97938d50dae5d0a3e505a66fec7f99697976dd
SHA256726ecab004ccf782b44c8ff35eee01c364c3d2105467f9eedd5fc63c4608e3b2
SHA512b0f596c527cffa3f4b4698cda89eb296d3109a7a9bc83b4fb9ae7d640cf1db58a2974c16439429b1b0b92265e551eb953b4f8e69e72bef88c06e4e11c34c8017
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\873eecd0-28ab-472e-ad5c-74f5be92e9b0.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD55594465bd7d195b6fc9be7462d4c4cb0
SHA130c8227d186de26bfa6e423cf9ebb76df17da288
SHA256b9cf0609c825742a6e363f61c8cc8378f8d7349f6f79288acaea01553b325f0b
SHA5128018a359449638e5403e9b7ed0c4e67b54d291ace82e152d1d4d6313b7b764e4d2ba9c8198514514c3750b8f77843dec96eacb436f151dda29af2481a2b6c631
-
Filesize
14KB
MD5220c30192ba86203a07c09813b02536f
SHA15f0f9acdf5d0a4f64ba0c062152cd7f496977df9
SHA25651da94448ae161c692bcec845424bb9d162436560e3f9592b31a35de8659db5e
SHA512efbc20c8a0e792bcbffa2273b3304bf8b1c284b3c12e1d7b0d08bc62386e3802778787e04294aa865291c2b18b9f517f0c326175905ed0698a8727436317efb0
-
Filesize
15KB
MD5cad55b0efce3b564d5bd55859b507314
SHA12cf812cb1297f1171ceca7f1eb5630adaa9ddd35
SHA256879a56f83b2114a4a0b96ae7b1c1f2f4b2bc6d9c8e52f0054a7761d241222025
SHA512154810793ff32f019710eb1fbef2f9e6de33b0f8741ce1015775beb04821be7b910c5433c9277c24d8c562f2ac7a28b230f2a6b14fc7950949681c663e0bef97
-
Filesize
36KB
MD52bfe64df68532759fec12368cd2b0e0d
SHA106c5a081425aebc40bab1765d57b06109eae7a89
SHA256afaf050f32ef8e9331bc50120b794abdb34e66f4cca7b0f5cf074049ee8c658e
SHA5123ac1134dda55a6b8f0210679323e7370baf6b40d0d0415a0298837d66fda575a6a30c8952989d38fecca8aff219d56cf034ac5fa5b9557b367885994028a02eb
-
Filesize
4KB
MD5bf7a757638e68b92a98079b4902dbc77
SHA12bc8fb766f254f7aeb7bc2e49e0bc0c46a040c55
SHA2566993c21fd1c2d148199d5ce53a61f8cdd5cdd56f8edb9054ed0591681def78ac
SHA512fa887e36855ea13de657ffdb9390b63ceca2db05de69ff6173675a43f3642634bde69dfbe1faf9eeb6f7780109fc5ef40b12ff27cf30cd6d065b3e9ed9b75444
-
Filesize
876B
MD5c185058b5662a9c17909f86447df8273
SHA130233de5b6737934a4f74af873471e1b4b1b3414
SHA2568c3b152ca8fef0a813d92dd9135e591061b40e63f52c1942e28325fd3cfe38c2
SHA512e9c58eda8b4efc2d86405a8422cf5ee4d2fbd360fcc2ea17be885f7967fc4c69bc3a5898a44daa734cbb83d5e5b4e1e965692c93cbee876bde3ef2c3a10119ca
-
Filesize
23KB
MD5e644a40a8ef53f05d09994018c3853bb
SHA1492199afa8645212eee70e5afb9de4e88d3b36ec
SHA256d4ac27ca0a1e6ba402c4aa5eadff6a42f531f6c2462fbdb3bfde117550f050cb
SHA512c844667af705b93c825ef24e2b5c8bf11134a117aa473d61b9fa1e18d3d7712e92b6893d2b9663110e1c22093e1373039009d771e09a7fec69dbb66c77c2848f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe587942.TMP
Filesize467B
MD523408186e2382d233a80cfdaa4340c2a
SHA19ffea66aec5182997647c968f0dcec9233e52a61
SHA256cc5521ad16981b637162f1c1d86c3362233cf1ccd2a64cfd646a1bddb3abb612
SHA5121bc78457af1ac254f82ba707b7d1a2869cfa72c89f63426a0f098538f58022c4c40dc4e57dbfd0b776c19a3b0ce02c4706591236bcf6152676ba8543652b8e2d
-
Filesize
21KB
MD597ffbea42e9a0795865f12dedaa14292
SHA182b1a9a09d849ca8e55914ceb05677991729de10
SHA25684db83a7515ea99283ea322d6ae8a7e806287e7e98771a53a5d0e3ff362ecd16
SHA512884e56e3e7419a5ce22725d8b39b6d9424c882185762fe6ebb3a5c67d65e87b846ecce8a26491019acd3ba79641f489a32e20e2c7b99576315352cca1f5a13a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe5879de.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD548ccabd97fe3911363e07125c15992df
SHA1a3d0801dc5f2b260f6562b5862dcdaa0b1eae056
SHA256d15ad84a46684640ab5bf17ca783b86df883e1cd0f92299114fe83bac2cb8798
SHA512c98bbda1b5dea3fad7bbc6db2f6e19d9b1d906cbac1d20fed1d3c92519b6a17f4caaf1b29d4f85b376f97d38d2d55ad2021f9c5e0ae62ddad5a1e7bb9a9ac915
-
Filesize
6KB
MD5cc81a37e6608b198fd33e08a6a12fb8f
SHA18ca7ddd084f2883edd013f86e570cee7416d33fd
SHA256b6935e0626f5e773f0c8d4beb9d373f4267e312f96d93c3a675b8164e1fdd40b
SHA512d3ab2b0cffa05fcd222430e5d16772d296dbd2c4269dcff2dad867dc83aeddd25df21740e3e60ae37f920656cb9d9b65caf5c0b6f1c093bec5007fdc70d4b7c8
-
Filesize
7KB
MD53532cb9a16714cec0b71dee6d89dda81
SHA1a74ca9c59a345189c07ebeb9d0b18e113d489355
SHA25664b2074ff165d1611625727166a2076e10abd7e097d7e41c105e28c3baddbd5d
SHA5121a92154fd3b5cf66f54d168be2328446ad97181ff5a91a15638e4defb69ab7bac3e5ee242b27eae5309d63f583b01ff8513a3f88dbc03b98a129c9a66fcaee3e
-
Filesize
39KB
MD513bdb8111e33f3837ee16c942155710f
SHA155f07453231d01f39d18d36a5a9d0d6543b7cf76
SHA25626ab941e9e8f8b03454db4b7e928f0895dde6241a2e03d8531e34620895df3c2
SHA51248ca3e3bc0042b6f0b697fccfe48ae5b68afeab4173e4ca26103621cea3cc30626c8a113a8a34a8f6f7f530137eb0e88011ce58907c84d5dbebccd73d2a53bfc
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5a5f44de9e9511cb515af8341135817f3
SHA10bbd6a676cf275c62de47d399e40318836fca495
SHA2562283523303a23352e6dbf46f88de9ad459b41cb3ec66d145e05188374f7fa504
SHA51240e753007993f92a1fb6efb47e67fbcadffa54a59ab48cce1f3377b8982a1c66a97f8b6fffdda1d8c8d6e344ca75e092b5c1874dd27161b361ee9e8353a31f13
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2076_2140395849\8ba04a1e-ab3d-402c-9e92-138491cdb946.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de