Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url386.cdjapan.jp/ls/click?upn=u001.-2Fmi0c-2BSGhdpRLjpbdIkdDKMW17-2FuWi48t8E9ZmMdrxDe2QqKWPr2WbvuoTp-2BZSRfz9cwZk9IGxsiTDBhngz8yjtJnzCyVh23u6i2izIpnDlOclc1A0X3ePP9FiggNrLvudHPXHGLCG-2B8jO-2F6KFrkn3J7AePEk02qqDHfoRQCNzO1xFACtIZxTov9VF8xpv-2FsKS-2BlMjEhT3umuCInTbqEvFVlDlaGQgJ9GLZ9ERkZxhQ-3DMGym_jz5zi-2Bh0-2BbLCT
Resource
win10v2004-20250313-en
General
-
Target
http://url386.cdjapan.jp/ls/click?upn=u001.-2Fmi0c-2BSGhdpRLjpbdIkdDKMW17-2FuWi48t8E9ZmMdrxDe2QqKWPr2WbvuoTp-2BZSRfz9cwZk9IGxsiTDBhngz8yjtJnzCyVh23u6i2izIpnDlOclc1A0X3ePP9FiggNrLvudHPXHGLCG-2B8jO-2F6KFrkn3J7AePEk02qqDHfoRQCNzO1xFACtIZxTov9VF8xpv-2FsKS-2BlMjEhT3umuCInTbqEvFVlDlaGQgJ9GLZ9ERkZxhQ-3DMGym_jz5zi-2Bh0-2BbLCT
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1755794446\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1755794446\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1153867079\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1153867079\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1153867079\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1755794446\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1153867079\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\hi\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_5060_1434283005\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_1755794446\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_924030724\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_924030724\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5060_435555826\page_embed_script.js msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876330417347821" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{8259A11A-0F07-4EAA-B903-92DCCB872062} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2384 5060 msedge.exe 87 PID 5060 wrote to memory of 2384 5060 msedge.exe 87 PID 5060 wrote to memory of 6012 5060 msedge.exe 88 PID 5060 wrote to memory of 6012 5060 msedge.exe 88 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5788 5060 msedge.exe 89 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90 PID 5060 wrote to memory of 5156 5060 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://url386.cdjapan.jp/ls/click?upn=u001.-2Fmi0c-2BSGhdpRLjpbdIkdDKMW17-2FuWi48t8E9ZmMdrxDe2QqKWPr2WbvuoTp-2BZSRfz9cwZk9IGxsiTDBhngz8yjtJnzCyVh23u6i2izIpnDlOclc1A0X3ePP9FiggNrLvudHPXHGLCG-2B8jO-2F6KFrkn3J7AePEk02qqDHfoRQCNzO1xFACtIZxTov9VF8xpv-2FsKS-2BlMjEhT3umuCInTbqEvFVlDlaGQgJ9GLZ9ERkZxhQ-3DMGym_jz5zi-2Bh0-2BbLCT1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x258,0x7ffab2c6f208,0x7ffab2c6f214,0x7ffab2c6f2202⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:32⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2508,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3512,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3548,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4860,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4344,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6040,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6012,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=6156 /prefetch:82⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6156,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5688,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5776,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5756,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5136,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5256,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5272,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6456,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=6516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1036,i,792572292581356998,17911193053521741867,262144 --variations-seed-version --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD57b0736a36bad51260e5db322736df2e9
SHA130af14ed09d3f769230d67f51e0adb955833673e
SHA2560d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087
SHA512caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5d308f17e77feae6ae8bab911fc84c875
SHA190bc8a7bc93b897db58db65605bb837e7d68138f
SHA256dc34df2476fc3ad37dc8f2fb41d3824c8fe0b44d30dc5807eff3c6305ca69507
SHA512364106a304b0a902349c8856aed1e7ced158bc4365c5bb04c85484764cd176197caad7344222d2ae21254b9a1037b41a4195b1860723d6652a43e2a6ade1bff0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD511be6989d5f3541b5c9079a3994f42b3
SHA1b4d93d021aa8cc1a204d84bc6ef9d9888603e66e
SHA256c66427322def08b1543a45801c64b8e5430c963454bc8db659aee29ee88705b2
SHA5120ce31a56a7d8228680c0bd1e838ac6910cde612dbb3f185b8b2fcdaed814080e999e278bf8915952c7348c17251532452942878d35da1cf0395b95bd1903d0e7
-
Filesize
17KB
MD583f37d4e561f4a0044a6cc30c961242e
SHA198da1a053fb767f8dbbbdfda7ad21d08b19aee97
SHA256ea9420022a24e2813ce98782fa5ef86d002b9b4f75c576ba8c91f0304ebb8d44
SHA5126944250f604ca9c538fbf192fe1e8e15b9b991f7ebd0849446c77c6606f5be99a5e8fcbc86b93879a258ee384cebb639de201eceb4de59354b5b24eefcdc8a03
-
Filesize
36KB
MD577b938d10ef6c10c117a0c354e01401c
SHA15e2f041affb920cda5033abedb40b7c97fe53c4b
SHA25637c16f6dc3899972d9202714275b96a9b92eb891e185a9dc454dffd69d518942
SHA512468597e926b3591738fa4c5882d46153dfd6f7b7303d2e97093e29c334c4af0decde9c21884986e94aa32719f94434d43dc5d0e561c07a446b3bc2b057841aa5
-
Filesize
22KB
MD5b18aa05832ed680461ea69f271a62bcb
SHA13bff1b68f4e3632d5f2e3f374c865525349a4636
SHA256395ec8e5470f8517c2adcdef9af5a8af16382da027210683f0de55ff2fca0cc4
SHA512043d530a65d668a504e82201fa54ad344288730afef80f3c69bfc14ad19c214b273bb8e6b91604bf59a008fe96008e8568d2aa0c9b302eed7293eb43a0bd0488
-
Filesize
469B
MD540cfd1c15b27e515381b747474603638
SHA1b7362f9b051ced91a4c136a84d0dfdc2866170ef
SHA256621c69250b72502cf0e6e25723545670e739cb18334f21ad8513921ed07a2716
SHA512e1c0c5e1c2528f9b054eb60a6b59d9a0326fd7d9998531372cef0e1e057d7277a7e0f4ef28a90ce8de1d8335d16b8c52492dc76eb0ecf88c504c2f5be94a0f86
-
Filesize
904B
MD5e1c8fe24a90897e63167f5d031ddc54a
SHA10411a89ce35a4468943aaec57a607be53354fd11
SHA256e6bd463e85194746ab3fea4649c9821f2f0ded935b87fdb17896f8b9deab3c90
SHA5123f9e616c9a6fc05b5972051b6a223a83b029528e4bdf7c2a12df4b543a05bc0df2a840632b34d11c6498a25f9436b3f091003ed3e351e1906b4ef7bc9e8fa573
-
Filesize
23KB
MD52274b609f00bb68002446493b391e6f2
SHA1818ff8488e819ebbbec41e939426b0d6ff266925
SHA2567e642278855c280a3250589730f22f3e0cff7484edfeedf0bd98ee7fda7366c5
SHA512d257cb855a84135bc4406a72cd1b5a0a3be0a99cf8e3dd328e1efc8718f9a86bb67147d85f4c3dcfea7f014b7a21d299f876b02f0fe585fada513bfc0252af0d
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD5441ebe3fe2470f12c56c43ae64bedc70
SHA10bc6f04ea1804af8d38c3c04eda1d3f0a9e11246
SHA25602a668b6c2047ef974806e68c05c9b6881d82048f97ece04648f0292e0c192f0
SHA512d528cb7f4d43371dbd62045652dc93c9df63e8326a3a9f986f772b6e02c05294f9a668a4bfd7179636f27997e278a3cf29ec87524cb05d93d2c5f0b899d87196
-
Filesize
54KB
MD51fbd27ebee64bbd11ef4dedb75e06f17
SHA1ad28444dd3a8a242fb43261ba6be844f9bafb623
SHA256f8a9002297455b79b08fa7deb566a4e38746beaa023bd8c6876afb5752d5a6cf
SHA512e226cbf963c6dbdbce32a19226a70c5088c3a9c0cc8ac90d66674b0fac73d0cd766ff5ec6c710144f356471e64f14a0c7c38c08af4574972da819fbbcab86df2
-
Filesize
40KB
MD57231759fc3ab1f9b2fbe2cfa0a616bf4
SHA195d943b91f3eaabc9ae5e9849ebbb623d5458f7d
SHA2563ea9cc1922f7ba94b77a79fad026381e167cf04edc9c5cc0876ff78adecefe56
SHA51253b1d8cf796ed9bc31e8e240af35dd9b671cd9ea61941941a3c1f5fefb8748e12f2d32367a4225189c27e0e25f8cb860cec865c18c021c22984ac482448df489
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD586f7aede034b5df02b783a72a38660f3
SHA1416be84f3ff7503c9de99de28fa6923a7ee9097b
SHA256de5caa4cdbf705483a62831a1df88bea13f7a4bd5adf78ac7f1cb454b035e1be
SHA5128b5c42f6f20aa9708d3c8c360cc50e5004da7520ab3100b6d24feb3eb2c4d513971145f3aa8cbb1bb18416f137300912cb554472f5d0193f4e0c7fd660738801