Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:19
Behavioral task
behavioral1
Sample
2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe
Resource
win10v2004-20250314-en
General
-
Target
2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe
-
Size
8.7MB
-
MD5
605ab1eaaa0f22a5884b703ace476e66
-
SHA1
200ef10925d33afc80094c4da77055acf07c9ed9
-
SHA256
2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0
-
SHA512
6e4a5624312fbee85816b67fad46265093ab439c2f8c331899c08d290f53ee3dda77c4d224d288e44b69c777ed527039bc96a11d58b9474d82767912e8a1e34f
-
SSDEEP
98304:r4XaZDS9+Q2jHX6uYYZN1Vac32z64SDHNprebZtjKjCB3bFWDxFFcUrvS/6Qc:Qt96HKuYYXF09IgYjCB3bmxV9Qc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe -
resource yara_rule behavioral2/memory/6024-0-0x00007FF77D000000-0x00007FF77D91D000-memory.dmp themida behavioral2/memory/6024-4-0x00007FF77D000000-0x00007FF77D91D000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_407890213\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_725084450\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_71094164\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1659723931\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_71094164\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1659723931\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3424_1228748483\_locales\fil\messages.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876307917739298" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{289A70F6-AE95-42EB-8F76-420A0FB6F399} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6024 wrote to memory of 3424 6024 2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe 94 PID 6024 wrote to memory of 3424 6024 2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe 94 PID 3424 wrote to memory of 5092 3424 msedge.exe 95 PID 3424 wrote to memory of 5092 3424 msedge.exe 95 PID 3424 wrote to memory of 5532 3424 msedge.exe 98 PID 3424 wrote to memory of 5532 3424 msedge.exe 98 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4312 3424 msedge.exe 99 PID 3424 wrote to memory of 4236 3424 msedge.exe 100 PID 3424 wrote to memory of 4236 3424 msedge.exe 100 PID 3424 wrote to memory of 4236 3424 msedge.exe 100 PID 3424 wrote to memory of 4236 3424 msedge.exe 100 PID 3424 wrote to memory of 4236 3424 msedge.exe 100 PID 3424 wrote to memory of 4236 3424 msedge.exe 100 PID 3424 wrote to memory of 4236 3424 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe"C:\Users\Admin\AppData\Local\Temp\2d585c1eda482120901f878d4f394a8796c316102d3f957b73565862989ab4d0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pc.weixin.qq.com/2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2f0,0x7ff964f6f208,0x7ff964f6f214,0x7ff964f6f2203⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1720,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=2252 /prefetch:33⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2224,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:23⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2388,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=2540 /prefetch:83⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=3508 /prefetch:13⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3496,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:13⤵PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4620,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=4908 /prefetch:13⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3760,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5024 /prefetch:83⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4392,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5520 /prefetch:83⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5564,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5620 /prefetch:83⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5564,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5620 /prefetch:83⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:83⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5896,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:83⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:83⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6140,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=6108 /prefetch:83⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6156,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:83⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5096,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5132 /prefetch:83⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5868,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:83⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4856,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=1920 /prefetch:83⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:83⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5728,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,245936068258350909,2584900797835734559,262144 --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:83⤵PID:4648
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5c89f2e69ea35235bf0f29c6172a7f0a4
SHA1965ceca263f3a83355ab03f309c20982c0833951
SHA25676ea3b9ebfe8e527a61a16ea67f7cb024d57e0b1f12bc845b118230a23429728
SHA512029a0ca499c1f94b29f496988515814854478ac827f76ef12ef61d41c8a31fa62ae3af55c3754cfa47f6a693af2104a1b4f8368ce01cb2d2e15c0748bfee3068
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57e407.TMP
Filesize3KB
MD539cf0df82e64cebb049b5edeffa045b2
SHA1cfc83033d6863cd377c20dce8a74b3fdcd783a90
SHA25651f9c4195341788fe9b3115685bd65f82bdb28ef3f0fad73a716aea4a0c0cfb1
SHA512d3ae584ba0970a7e6ec1ecab58d4b77b3bb530bcb1d7bafcdfa940acc6b0c83ebaa0db484c840db9cca514476fb49cd916af8480e9c52bb360f8ff4f2a5da49c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5ba55e6e803f20cba9537388e8b06e03e
SHA16a91fc33925a4544986cbd1204d1ac468084b15e
SHA2567d08aeba18d6bb802239a1f6e0a230c18bcb6673525c86cb70cc7e2ba17336fb
SHA512d6c76329f0cba5f88043a589914ad8673f49e38917dc91b308cae1ec7a254def90abd237318353401825a4596d4cde44bcec3aa903f971256469b4a3495dca1d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5e00e782c30085ef033d69cae91cd1afc
SHA141d99b31a85671978c78c518169f519a7d8d0b37
SHA256daedb42103f88d7393d554cdb852924392e76e3db9ec4423e80ab4115c61f869
SHA512968de98634d481187dedef0587eb7a2c7a49c546888787d1693b4f9ae802a1c033625d9b9d2764ad8f58235321e0acbd82154011b163e6f47020e2e6dd32de5a
-
Filesize
16KB
MD5beb124f24d9e3e4b76173ce8b62905a1
SHA13fba50c5168e5d7599533f9f8eef8948b31c28fd
SHA256caf546738aede3864a659579a49c0296caad85c898e1d2c6bd376a2dca490dbb
SHA512a9746cb221331138ac86a28e5c1f9d149cad0dd1eff0c446a87f4b795e7ec35c4f11b65e7bad41907cc8c9f4bc7cf7679d4d02df03a66327aab4aae92cb09f28
-
Filesize
36KB
MD5a05eac0e790a52f04c589a6d4c87feb9
SHA13f130ea5f607ee548ccef7b07b23e33571f317ed
SHA2564e9ecde3d24a6af7c4d0de3c01cf56dcd75561a70567b59c6a742d6a85d45456
SHA51277a5bc409ac5e9d95084c1caa3ccdae0cd888db118923f7dfa3388512324694519a6f03c8cd6e205ed69a044034d59c844eba8f991ad1283f15bec1d7b5e1e89
-
Filesize
22KB
MD5679dc5df03367db7e1974eaf8a1b4052
SHA1861c15cb05e39c47798de9900185c39446e28541
SHA2561da445ef6e69fc91d33729776557cd7dbae9aee6b7f830bf4fec98c36ebb9a46
SHA512a3c4c662aafaa2cad92381f3991d500d70c3ce6bbaee4ca14e98186b2149063647acf5d23851314858fa1a90423de0638dd3e073f38736133f133aaff604bb86
-
Filesize
469B
MD5124c19e6f552bbeaedfab9159497e7f0
SHA180a03ee5a3f18440b29a28f49d693cf49b8cf9f2
SHA256bd0eb237850a08ebc88ac15862708f7c84a89b90fd937eddabb21cee5bb06724
SHA512d95191fbc65be79223c864e9636adcab2890591582121c5d639caf8875e817d920a51002e171cff353bdef21ea59a9cdb4a3f0de23bc41c54641a7d5a9c162b0
-
Filesize
23KB
MD506b128d616307fcf5c50d3c90591cbb1
SHA15cde13127c3f6225b5729779e2ff230151d7708b
SHA25612cd3c8292cf82a065af0a16517a4c17fb0a36bc7760179f7d901c5db195048e
SHA512cd699fefabbea399bd78ffe7459da6c6c15ecf62cb688edb7579edabd47caa4d25d85f21858b2a2352092cc7022ee053c650ce3aff6545b36cf3b8f4c7dcc0e5
-
Filesize
904B
MD5aa0f179840401875cab9a16e5b2e5172
SHA1d9f508aa12af9dafe824afc606cb9587ac6962d3
SHA256883034ef095ba812becf84ff7c59846edef589a9aee4f8fc4b0e7a82f23fc133
SHA5124e17ee4b40b48a033626ae99fa2484d890b0d76f7b10e4df0517504c17682910c9bf8593901e366bf1773589204e2824e8062fb5d3db0a2e042bbfee36cd375e
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD56c2e7effe6b1412dc7bc79588be13016
SHA17a1e86579033aa5f99a46ce9dd7778ed0d345281
SHA256d7b67b31e407877c5889b2a5bc45c2905e46a7b2014a778005180da41f209f51
SHA5128634ddb16acc57ed461adee274d175ae214c4a61842cd1cd9e18dd6afcf7dc2989f18fa67d08a46667a99aaf3cb596d1f1fec56febcbe0ffbf4edf9298a133f5
-
Filesize
40KB
MD55521aad2117c2b3579c8a59a36ace700
SHA1345d3617927f886e0a32e4a016f8ee3fc734f581
SHA2563fca544cf1580e2cc20be50e1f13f19ac63c1f6190294be35b668188b8b1fc8e
SHA51239d104e6ff9e104e5eb74c910a953d685580053b190c7b70eef434a20799f4d879f053cca32417da49fd528c9b4626c258f9aaf05f271a7d9a3ca1d5b4a196ff
-
Filesize
49KB
MD542c8aac9b76b4ca488b05e38eaa9e681
SHA1457da5171920e9ef609f8d164c349e6f672be4fe
SHA2561a550b9d444642ffbb4a1d662b255bb14eae34272a74b648bbc811395d1b6be0
SHA512e9552a1fdee07cd2980f96cc4b2cfe6d5e7794489e4ba125980dd15f4193cc05b4dce3e8bcbdeda79ff14258f0f2ba94d0b3458fa9a41147bb8ab46569ab259e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5358dd48a1878ef23ce3420ae50ba59e6
SHA1e29d3ac8dd71aabbfdff2bc53e10e9ba94737e9f
SHA256f25ba24c0605f8253a6d452ce2c6647fb5436ec1365df65232704fbbb24798d2
SHA5125b7679b847417670e0a4bdc2d7f1ec412c7391fea27138dd6ac98e6c248bdecf646d74d4bd31bf85d5ae67d126f00fc4c9a517c6584868e4c1c02180db7358dd