Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:19
Behavioral task
behavioral1
Sample
3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe
Resource
win10v2004-20250314-en
General
-
Target
3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe
-
Size
5.2MB
-
MD5
228c840e73206cf6e00666c83bc0dda1
-
SHA1
d2738e67e98c07e9ae43015364f74f0f68f40316
-
SHA256
3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559
-
SHA512
280f4849abd2a1d2348a05d9d2131d576a668b7d63638cabab69d26783a54a29b4937e3e9d76e40c6720e383737f969fb1cae71107766b1f7913535e121bbae1
-
SSDEEP
98304:WF4C6Z+1AWh44x0fIsRy+9SGX3XYuZIEmFWLIAUchvIDHeU7kTTpLz:w641e4xkK+9hnXNnjAiU7STpLz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe -
resource yara_rule behavioral2/memory/1348-0-0x00007FF7C69B0000-0x00007FF7C76BE000-memory.dmp themida behavioral2/memory/1348-10-0x00007FF7C69B0000-0x00007FF7C76BE000-memory.dmp themida behavioral2/memory/1348-12-0x00007FF7C69B0000-0x00007FF7C76BE000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1348 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_182781886\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_182781886\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_182781886\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1961885443\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1671068480\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1671068480\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1600034953\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1671068480\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1671068480\LICENSE msedge.exe File created C:\Program Files\msedge_url_fetcher_5020_154318892\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1961885443\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1671068480\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1600034953\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1600034953\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5020_1624370517\_locales\fr_CA\messages.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876308093053433" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{D40264BA-14B5-4F87-9E2D-B5574AB902D0} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 5020 1348 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe 94 PID 1348 wrote to memory of 5020 1348 3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe 94 PID 5020 wrote to memory of 5052 5020 msedge.exe 95 PID 5020 wrote to memory of 5052 5020 msedge.exe 95 PID 5020 wrote to memory of 552 5020 msedge.exe 98 PID 5020 wrote to memory of 552 5020 msedge.exe 98 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 5540 5020 msedge.exe 99 PID 5020 wrote to memory of 1744 5020 msedge.exe 100 PID 5020 wrote to memory of 1744 5020 msedge.exe 100 PID 5020 wrote to memory of 1744 5020 msedge.exe 100 PID 5020 wrote to memory of 1744 5020 msedge.exe 100 PID 5020 wrote to memory of 1744 5020 msedge.exe 100 PID 5020 wrote to memory of 1744 5020 msedge.exe 100 PID 5020 wrote to memory of 1744 5020 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe"C:\Users\Admin\AppData\Local\Temp\3c25d45a330f1dadac0527f9ddbd526e830b1515bf6e9b7302dd228576185559.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pc.weixin.qq.com/2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2d8,0x7ff9f794f208,0x7ff9f794f214,0x7ff9f794f2203⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=1844 /prefetch:33⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2340,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=2336 /prefetch:23⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2624,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=2760 /prefetch:83⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3432,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:13⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:13⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4916,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=4620 /prefetch:13⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4732,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5108 /prefetch:83⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:83⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5524,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5536 /prefetch:83⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5552,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:83⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5552,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:83⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:83⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3700,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:83⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:83⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6236,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5980 /prefetch:83⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5728 /prefetch:83⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5116,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:83⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5952,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=2124 /prefetch:83⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6088,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5992 /prefetch:83⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5232,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:83⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5932,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=5896 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6192,i,11481331042736266429,13864050919248753974,262144 --variations-seed-version --mojo-platform-channel-handle=3360 /prefetch:83⤵PID:3924
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:728
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD539221244e468cd67922c7fc78577c604
SHA1f53cdd3a4002a1247e8fd1adf32720066f3187f8
SHA256570d2561f956958c9b45e2bc2ab8caafedd4435ff958b13530614ef7c40d9436
SHA5123c22e878d242a5a5bd70c44eb8e031893db08c85ce0c30297a45fdf828bf2caf833577a5baa81f6a63e837f516937a1a86342a213ad1e1e0676fd2fae5264762
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57e2bf.TMP
Filesize3KB
MD5f248ba4a482cd0ac74817c116de3df23
SHA1f07a373ca06091e5bde1cf3338d558ee4e42108a
SHA256280c59c35cf3137ed7fa07ca72ead7089f009913ba2f0c721be65163e65d8742
SHA51238cb10d0d33a31de5ff0c443cbedd1c87bacfd88d87e7b90e9fd512b83446c81e65df1c94814483260a200063a244db2fe01be68a60b77dcf84d446200137c03
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5183cb4b615496c6221df0cd90a757e3a
SHA18fa7bd9cc97c3b0fa77ae0352b832b3b58bfc4c4
SHA256a8eb4b34b45ebedaa82ec19880bf8f01c7bb9fb1329bb6e1548598a925aca176
SHA512d98f4e1d8d5f28e2dd364dcc52ad8f180bc91d86c86dba45a1ace17fc36ed747319564d5d4b1a24f8afb5091617dacf7fa44f517640d2566802cab47a27443a3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5fe8ad1a868c925ac5cfc46d5825af8bd
SHA1ccf09545280f7ec7001072a81c0328218eb23d1c
SHA256cd6adbf0703c0f09934f968aa99b4a4bca58b719919d6ed01f83e9651d7f1e74
SHA512555fb63d62d6b74b101f29e702d9ed450b0c47360d73bdbc38f708e13873f64bb5ecff07422ca86791f939d20e6679589232c44cb5dbc13ff04b25657ce91998
-
Filesize
17KB
MD502d530b9a002e99a031f0cf448f0d240
SHA188a49dac284d5d903d886fc772f38c165faf9581
SHA2568a10fe8f1bcd3f79785e88fa507a24c44e404d5d9c5e38bb5d83e6c3aae9f19a
SHA512891a99fe07e20ee6033fd2c170a6cb7a78081293b678d360e62c8b493fdecd4ebca946c32bf1eaadc17ecc62b5880f5e425bd4218a5d30ebba5a041c89fd8c1d
-
Filesize
36KB
MD59515e0248084a6ef06c3fbe174c7b1c3
SHA1a9306f5e7bc20dca55d079ea5c22c2bf1f4ab8f7
SHA2564c9dacf3fd70bb2fab885a7e2bf48209f349189e1160c98dc149426ce4c242fb
SHA512699e81ca8483b16ebe2cf4d7a8b4e149fd91671961086933e5e3cf3b1c3758f9f4ea6df4c9659fc167c3e8becdb38a782ba0699c0d4a1709c80fef2753f3fa47
-
Filesize
23KB
MD513dc7412bc3234018c37884ca783b267
SHA1920fed7baa3259b76b8d8ebb0c9da532f09c96df
SHA2563be2835158acacd2ebfe857141a96aa4e29ad4bb238b60b30a6c8595945e5628
SHA51251b62bb8110783d01bee2bc99ce00dcc9f452f6f15d2d6032660a9f6565d6c146d3786bdb10ad453fab2bc7989bcc2182675980d9bd00494281c80deef6666c4
-
Filesize
467B
MD53c7cbeab7f271a4f85eb81b5ff75958d
SHA118b40a30577f48ff74df8c640ed8e9403d2a96a5
SHA2565abc183b5d1c62676681106d4fa82599698ebb508cd70ad1f7f9968ae8534b5f
SHA51251fcc1f0a41958d11debd0f0d9aba26193edee1037ce82b264925a681d65c5aa5e2a51052f7e9f789b2bb5e7a01de5b1a097a7c03f2523d3b82818bfb397dee5
-
Filesize
23KB
MD54bbd18488d7ba8e83e9f0c6b9913f1f3
SHA1c5f4f2689971602f3ac3e108d53f773d77877548
SHA256b82e209298575242b4bfa5fc065ac8a3f2133f021f4008046ca22e033b140e01
SHA512e9bb804f2853eb7d1577ff14c14a89920cadd6b88343e4756b7ad28ebed6049fda89c6d3cd903fd3db223f261a074011150e97ea1bde80152e44edf3d8af4035
-
Filesize
900B
MD526e3f6849c92e830afb07b4994ad5e5a
SHA16285d6e8af8d4a2f69e73d4c6cf93774e54a574b
SHA2568e710abcafaa204ca6bee1a33fdee122cd46daffa4931c74dc8b061808499ab2
SHA5127b4907086d35637348271d0451ab308e9132d78eb7b4039633a91d14a15efd986eab2aee449ed1b574d1af4741d6a7abbae9f32a4347c510cce9b49a1fc30ceb
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD5d6641340578b2c54b5ca4042c7c33878
SHA12c4de929adc03748add2c020f008ead2b84a0fb9
SHA2568d4b9e94e9f742541902c1ac718012c25f19b7f6d0b0be80f40feabcc492abb2
SHA512e0068b8ec0a07e5d25807175f27d9234bcdaa8a23df3ce0566c02c0128480acad34c8c3d162402078fa88c65470538a1456e80997736fb1fc4a89f4e89113c1a
-
Filesize
40KB
MD53f08a9c4bfe3df09ca704cff71db2791
SHA1b6185a6534dbdefdc9ffa96710c1dade514a41ad
SHA256e3ee048b6d6a503f9e83db6336ce78747afaf35e6c1c0fb6279187bfc41332c5
SHA51259fb04f31f2bfd8c238f39af3d4f451e489d80ea7ef1c5712eaa43dc37d9488b45fdbad9c2bd5e06d20f0625bd1ea5f16d3ee9af191d5454e54db2129d74e70f
-
Filesize
40KB
MD5f950dc3185dc01aad4a6c3b5971dcdc1
SHA1829a56a4cc019a8d3970ada35e41879bc8d43eb8
SHA256f25631f51af62149540d993ed7a22913fd87330d2242e1114ffc8bb8ce763380
SHA512cec3a840b4eed011aaa7aff56c78e1c33342e5c8fd9183cd15d451ffd02c392fcfdfa0f30c0a9f73ca589c3810cf41c88beb6f2080f30de4801125b5bb38e1d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD559f5f4d0567c6813caee634bce5bcef8
SHA103bbd274e86bdcf2c27698a44ac8cc26939dc1e1
SHA2564e0f48898d664c557160d1a090b27372ded24b5b5a17930d3535d784f7046d2f
SHA512f3f0e3029b696801e0618a659180ebe87ee6032276c1ac499e877d6c7b3b673fb377a3d5e50186edd33ada590087f9752fe1d4d18be9a1799da3b8836d36597f