Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 17:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://serve.tigogtm.top/puntos
Resource
win10v2004-20250314-en
General
-
Target
http://serve.tigogtm.top/puntos
Malware Config
Signatures
-
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_1662685515\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_547741784\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_547741784\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_547741784\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_344721579\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_1662685515\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_1662685515\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_547741784\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_344721579\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_1727892969\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_1727892969\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4416_1727892969\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875689300329095" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{D13027CC-A43B-4C17-8A75-DFB7A8E70287} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 948 msedge.exe 948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4184 4416 msedge.exe 86 PID 4416 wrote to memory of 4184 4416 msedge.exe 86 PID 4416 wrote to memory of 3668 4416 msedge.exe 87 PID 4416 wrote to memory of 3668 4416 msedge.exe 87 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 4268 4416 msedge.exe 88 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89 PID 4416 wrote to memory of 976 4416 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://serve.tigogtm.top/puntos1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x258,0x7ff84759f208,0x7ff84759f214,0x7ff84759f2202⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1864,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2192,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2436,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3516,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4248,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4304,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=1732 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3988,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5220,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3612,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=3720 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3616,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6076,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6256,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6280 /prefetch:82⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6336,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6436 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6360,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6608,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6416 /prefetch:82⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6648,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6748 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6472,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6620,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6624 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4024,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4528,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4548,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6908 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5112,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4300,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6036,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6380,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3428,i,18268016202547537624,17663099859728983145,262144 --variations-seed-version --mojo-platform-channel-handle=3248 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
7KB
MD55abdb6d10caaf3b28256f2e4fa3040fb
SHA16b76f56657fb63e15b3899ff60dee9daa0d4f116
SHA25648f4b620fa5a7dd4f2df7381cb461f52e3651e52ae2691a666cee49499312878
SHA5129d4748ec102d367ebc92700ac2eb6714dbe15cf32e4f898114458c1cac403065cf90b1115e93ceed36d77ac82b0444099acfd6ded0f3b5c34ec0fcf296598a01
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5c03de77e7cb8fd3d96ec3e330618e211
SHA100faef15df4cc57c2736f54711c62006ed51bed9
SHA2563f835de4f441eadc2a52bec1a78218deaaadf255b40e3b4d8360b4ff644f07c5
SHA51255a7386a0fdb19ad3406c13174504d3e8319f3774b0ee12d41367c4d452ce4db1b35a5b74b7d00f367c2e1b198b1edabadd7693040d4db828d8b463607e83cd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57b602.TMP
Filesize3KB
MD598c07e1a540f3b05baa4d286b17f5524
SHA13961b5a1b5ba78358bb34da2b1ec40a48856d5ce
SHA256f657062972421b6c2827b8e0aea7eb55e7b44146793625acf52ffe4396708b2d
SHA51234d73f238d1dcaf9c52144db8ba8d07a809b6ca75500dfb5520e639c4227c543f215c2309c70aea30d4d0c36a9134831729ed65b68d80bbb1234b0372bc1079f
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5422d63cf825be9edcb326ab6d684d1b4
SHA13da65b7831483f2ab42403fde79ac9456f961ee3
SHA2567e2c9384c07d77dc52c0dbc497809749c8cbdec9305619d05bf650d5f65f168b
SHA512c37e74933fb04c7fd106ea0573a4733daeec88747fa8bda290065126226efafb28636c8382ab84392a72aa59e30d68f093b7f68e6090de9dec50945cb139c014
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD5eb548b6690388ac893ef296940fb26b0
SHA117ac9074c2f1ea03c16c1701ff9046c7b2b80d48
SHA2562c6c60d4c24171da2360eae6113c7a99e761f4b384023dce2299821f76338447
SHA512cf304b3292d7de6da49ebc4d45ff48861b8a6eb1d7fcf3a5a925bc1cbbd1aaa878ac82b7d751f47ac2c72b1489d2965416cc907f0711228ed97f2498fcdc469b
-
Filesize
14KB
MD54be9c95fdbfc2124722e593cb45141f3
SHA12f28590c01928fd43251022d50e18ec17ac3c1eb
SHA256716899d4fc6384c6b640e9d5c0a0f9b6257ddf57175b0c6f787c9afaa5e39381
SHA512d6c5f2c9ddee35a3656cf71899effeceb1502bf0491ff339cd9b5bfbd3fe8d1f68c76d387ca3d88cc3b450664b809be6cef6485cf8f035f3270aa49498116838
-
Filesize
36KB
MD50b4f10d641255d87a5b45da301d31a90
SHA112329a3934b11e0c0fff2298beb04aa18ef53c9b
SHA25608d3914d0c0e9cd0bf01b86dd3aa8b6ca883575fc705dbe3544fa0f7f6392031
SHA51242aac7f5ec5faa312859e8a9fb281a561228714ef2f70372bf37bd82152b3766795aae6965337ecbbde16274850cdcacf16a4f19a81ee190ce346d549109a474
-
Filesize
4KB
MD5b498e048e6d6c706be42d3f3fa70dc58
SHA11895358bc42be06bdba47b8b4d5ee71ebc96b038
SHA25637ddf0b0b0b750b35ad754939ad14506efeb025ef5eebbadd4fc99f4fcdcc64f
SHA5123f25db202c6082483f81d8c51bec5b486b620799325d5ee5fa6af63293eccab434a63074f534641423fd657bc80620c2baa094f94b12ca641ab2b961962a5299
-
Filesize
23KB
MD592ba8e63b901b04932dda2b29a88f23c
SHA1bfe006ec43936608ade3380d2884e25055e37db6
SHA256391a93135075852271dc6f0881c65e481576c9ecac0b1e584025b5644e54e3d9
SHA51294e2cee5a54db55d92e8a74ab51873332eb0b012c02e22eb633882a7765c8e66430286a386ae46d72034931be013311f19b9aac5a99880e54517ff968c41b9bf
-
Filesize
876B
MD5db65ede87c8d256c4c715106d62150f8
SHA16abed3acdaab8b186b5d8be3c8249d063b8cf035
SHA25610e13b79939c0c77a2108a5bd5e3e8bd4d50e8d0fdd10308e89796b73abf5b6e
SHA5125949b81dc062101862ec02509ca6640971019431011e0dbe7b424ea3879d10bccb323897d64955638ed10868474259d6aa6707fe6209b4ccd0f69f5c3883046e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe585109.TMP
Filesize467B
MD5efe37e00aecbcc169cab6e7ae35a6053
SHA1fe7d5612b85f575d72b3421ee4b134f2014dfba2
SHA256a0e665e5cedb4a668b8bc02f08a5e70dd1fda577660f21da504ede7a5ba9823e
SHA512cf22960ac4cf3acaea5e2df38b2bb887c92b1e75284fc2bb25bc1cf863b886945efef2d06158368aa455a5413b076be56f61f030d6eb5e18b897cf530658de37
-
Filesize
22KB
MD506592b86d8ab6309c77426804f7b590e
SHA1d63f876ab8d1dcbd92e052769cbf13f9a983534f
SHA25643920eeafa84fd526a2e7c9bbe5de63b5306fdc17595bbc4e8ad1370f53d225d
SHA512f2e4e7e937cdb486fa9d524b46d3a97a02624e4f612325da590fbc46ad337e063b771c8370cd389e581f1b16450c410850bf1979a46a118ded4a491fddb56ffa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe585242.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD57c8d7255af74c321d318e65fb6a1535e
SHA17a91cc87f41fb493b03bf345ec2559cc0b08d899
SHA256cca93b60b637da04d997afe6c663bd9b2ad86265d84383dad432c4629550e2ea
SHA512563c86fb6493944f46d6f679a31239e7f1ae2530bafbcd0f6c6777253d368a1d3f4ce8a344d3923cbd66a1cb451f2d0c83c5e8e2a06f4aacd8e2a7036bba2b0a
-
Filesize
39KB
MD584fa2a3904b0e20a23ad18574f58b7bc
SHA181c7fe0edad795cce26aed8c096ef71e7b018ed3
SHA256f4f6a51625f1e6a985702c6d9eafbcd76f9d676d8b1de2dd26d8ff377957fd91
SHA51248f1165a96e4745d33d8544ad7716c39107792699552a2b72a21f6c6a011c43b7106bd3bd0bfcaf69a1d9b43baaddddfc2d75849a465ef69ea0a7249c0b7994d
-
Filesize
6KB
MD5fa38705744e24f095c24187f3f993c22
SHA1d13c6ea519998db804041c31fd5423dde4b5a62c
SHA2560f132fe0abd67c1d34215760df0a73201fe4f7c0744439bae837d76d10762493
SHA5126477c0adbfbeac5ba80a3d62ad645ab7ec92289b0ec92b13e7fd2ebf8e0d4c2f93177aca77d62b79ab452c7b688b5dd362db8fd31cf1ba9f9dd0fe5b7d532fa4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD58d3c0fc69ddc3dc5df487d283d03eca2
SHA1e31178ceb3dcb576a8d8d526e5acf87c8d78188b
SHA256f3b86e2ec45a911c736c2c87607c76203f0d5bbeb23857c373d8ab0de683deae
SHA51224fe6d4a4a3eba67cd4612e378378fec1e6dc09a25b5ef70e029205154292cb82896336f146b2ebe9046bc26ca721a76599c93ba85f46e9261cf51a72a7c5d4f
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4416_1811697536\75c42749-e6fa-4052-8824-8bf1224ae16a.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de