Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 05:38
Behavioral task
behavioral1
Sample
Example-One-Way-Non-Disclosure-Agreement.pdf
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Example-One-Way-Non-Disclosure-Agreement.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Example-One-Way-Non-Disclosure-Agreement pdf.pdf.accreport.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Example-One-Way-Non-Disclosure-Agreement pdf.pdf.accreport.html
Resource
win10v2004-20250314-en
General
-
Target
Example-One-Way-Non-Disclosure-Agreement pdf.pdf.accreport.html
-
Size
7KB
-
MD5
7dbee78f642ac313b8d8b0802c72dc77
-
SHA1
fa4e22659e9726a4a07c86317e3c8343393dc648
-
SHA256
8c5f7b83d5b1dd3626e8302d8b24397714ecca4464b6a96ad19b29ce0626f688
-
SHA512
06a4c53ab6be5c8bbb5e2c21d5c9925f53d2059dfba2f0be74513b040fbe678244a1bb790099545fdf61ccb4d25094cbc0633bb193ff828589f98430b7df73ae
-
SSDEEP
48:IEyHGkhHJMe8HndOGnmzI5qtwzUPcc1j15c11mu0nUN6CM2D1o+t4yqrx7+3QYDQ:INHeHHWI0HcyR5y198JhfzRbErgjFr/9
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_815611130\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_203213040\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1244250306\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1244250306\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_815611130\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_203213040\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1244250306\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1244250306\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_815611130\manifest.fingerprint msedge.exe File created C:\Program Files\msedge_url_fetcher_5412_909470927\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_2104704497\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_815611130\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_2104704497\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1244250306\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_1830136184\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5412_2104704497\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876139033111154" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1062200478-553497403-3857448183-1000\{BF4F7430-E05A-4E6A-BF84-15FDAAB9F3FC} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5412 wrote to memory of 740 5412 msedge.exe 86 PID 5412 wrote to memory of 740 5412 msedge.exe 86 PID 5412 wrote to memory of 5916 5412 msedge.exe 87 PID 5412 wrote to memory of 5916 5412 msedge.exe 87 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1644 5412 msedge.exe 88 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89 PID 5412 wrote to memory of 1288 5412 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Example-One-Way-Non-Disclosure-Agreement pdf.pdf.accreport.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x258,0x7ffa886af208,0x7ffa886af214,0x7ffa886af2202⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1868,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:32⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2588,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4964,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4856,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5688,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5864,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5864,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6040,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5804,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:82⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6228,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4884,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=1004 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5648,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=6416 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6532,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=760 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5896,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=6536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3364,i,4616619087597097345,193832522206223846,262144 --variations-seed-version --mojo-platform-channel-handle=3700 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD555d8864881770588edb21708c22055a0
SHA1ca01e1c5e63919390343bc755220b780933b4fe3
SHA2569cc8e05d5de2982068534370a614bfbc00ac8b5a825ac2a57126bf029772c53d
SHA512d48b26584d1d2bfa97e7b60e800bc3f443310f00cdc56051908a5019072fd4868563fcb18ae9d90182a04cba3ef58a2c0eeeea860a71ea023f03bdb3fcb4b394
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD53e1cccb7e074c025548c86c826111ab3
SHA15a08ddb5fcc1b108c3732593f3e2e399e843cf31
SHA25601ce9657bd55ca657b8d5edf160583a4f31a7e28d7f2a800f5f728ec2b7cbc09
SHA5127f506d8e3e0e40c939ab6b72b80760e61c4c946034b05e0302882021b551c0f019c5e579d2bbb6731114793add45c5b4eba537b0fb34a747e121e0ed84a86913
-
Filesize
16KB
MD5c501c6e909d9c1d83195998fca250127
SHA1b6657949f22e6317dda8f19c6f7dea81d55294f6
SHA25651cf1123a79c333361a962387f9721f0954a30eebea6fd55e4cfb3d710419065
SHA512a25a2a2c428286889740fa7ce9b98466da34ab5e205a43267e486aa00fb055ea099ca40c9953688cef1ab50bbe7c133b056400e89fb83302f995e8b3861278a0
-
Filesize
36KB
MD5ae62b08063682cd62b36a9442ee61abc
SHA1e6a251c462e6d76457f088df3b6ce282b51fce71
SHA25651b2c1869f13747493b99fb00bb4f0fddd3b7e772996fd946d908c77c06ca37e
SHA5120d689e259a49f90b7999b2a49ffa1e3b0fd45ceca6ab176e3d1d26e4300b8e6190e57e662332278ca2534d8712ce8a5cd2d41fe807861c24de5fce78186ad890
-
Filesize
22KB
MD586f99361129897185786e5c793c83948
SHA18416dd12bc0051a5b0410df1fee1910cf737998f
SHA256f641e9b155b39e8c3d41e4d62836880a54ca9571aa71d4c729837467f9ab9100
SHA512c243dfb29103a523fd121055fa09a1a2a12fd86c8b524e5bfae80e7354046a29d534cb4a66729c0f7dd235b653b7929a721d4492ffd8f35d0b5aeb6e19487f39
-
Filesize
23KB
MD5000913a1bd22c005e922470285b85b5f
SHA112808fdc6e02f10f64831377a52dccb1d2603e47
SHA256f49cdef0bd3fc923e2e247979be69549e97376597d267313f0c615447b9feaf6
SHA512251a7de34a7a16043f63c1d77d50d0c70d470def76eb2167f01c1fc604ebcf214210a2b22b9df52abd390053721d800fa6504aee9c479c5632694546a680be87
-
Filesize
900B
MD59cf3871efb4b9fbf0f019c838d879575
SHA12299b614d09d3e99936191dee74076399442d8cd
SHA25642ee150b8316ee91db37f9ca72cf8a619269f515d29038cec3ba4004fbeefddd
SHA512d53164ab1710bfe025b2e80212399268282cc2f6763a0283516664e4039718b984ed614e9692696dd1de84a949fbb06498fd1233593495fbe478d77729de1839
-
Filesize
467B
MD53c3178a312f799781aa48c7ae5e9b5f6
SHA1b296287361b6ea398eb453805960ef028ec40870
SHA256d59c2280eda6d57db68245817c6c780fca6f4e514e9092b8d1b0a56b5a6d7dd2
SHA51246c82b9c896cc0c2a4ff217352b0bca4eabdcf885fab7d25d74b7a7016db0e9825ab168394c20867e47d350fd390a6bc7bb94082049cc9b64d26ed5e5b9351ac
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD59c13e074ebd7f3a072c3bb0c3caa7f34
SHA1a45d47f2e1c60c3acfcaee6f8f5196954dc064a0
SHA2562f87b2f564971d8ca3130928797d1b9fe48b431f9469c36f8fa735af4db0a7d2
SHA512ff79f288f7479d5820c3ca2a557c3ecc5f62050250845182e0ae3add19652b829ebe4f8a04fb0fe638cae612e2c34618b972e8d889731713adeac0de55107f8b
-
Filesize
40KB
MD5d02541570a0116a5c3e4f7f85659d2cc
SHA12fe43b64f25962a35cb4c1637d55476f76b33e8b
SHA2566c31df4900bfbead8d38c59b01c961688bfa378b099eca1c576a94781cacb90d
SHA512218f0c0bca780c077b856b336139d2437406708b8faa9e74f30d3ef090a3804a6d5aa1e885e307c8b211974e2fd5fd827a1bffff4d8a5f497e3cb4281a676811
-
Filesize
49KB
MD51bfef3ef2de6ea8a2feb5c5d60706417
SHA1ee991aa20a8376738333c9d8e4f44df2672aa1e0
SHA2561190128a6ee4dd386fa0ee1d42296a54108b3051f14a672277a81811ca7b601e
SHA51224c72f8bc892bba82d9b7a75418bb31d06c02d87b91fab7bb2a6c1d8dda66ecb59242af8efabece93a857efcc22a190c1aa142ce830a9277d63d78819cddb176
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5904187ebe85744ae97fadf59863cf373
SHA1a81f0302f5b55049f702acf42e5e1a00f9ce463e
SHA256e1e24c7b7689d8b061c30014e388029bb5947f8833dacf12e0dc4e7bb13f5610
SHA512a559d0380162d75291fbee0d560770962d6fff897a206816772068de70c162f4dc15185555822ad51626313c4b7170e2d9988846b6c3850723ea56dcd8d32b61